Demystifying Confidential Computing – the game changer in the world of privacy and securing your sensitive data
Confidential Computing uses a hardware-based Trusted Execution Environment (TEE) to protect data and applications in-use. By securing data when it is being processed, Confidential Computing can protect private data on untrusted infrastructure and prevent unauthorized access to sensitive workloads. Now available to deploy at scale with public cloud providers and OEM hardware manufacturers, Confidential Computing represents a game-changing privacy enhancing technology that enables collaborative data processing, without compromising data privacy requirements. This session will describe how Confidential Computing works and how it is being used within a range of different industry use-cases covering healthcare, financial services and defense applications.
Key Takeaways
- Knowledge of what Confidential Computing is.
- Appreciation of the data protection and compliance problems that Confidential Computing can resolve.
- Understanding how Confidential Computing can be deployed at scale today with Fortanix.
- Insight into application use-cases involving secure data analysis, leveraging artificial intelligence and machine learning
Technical Rating
🔴🔘🔘🔘🔘🔘