Skip to main content

11 posts tagged with "White Paper"

View All Tags

Mike Bursell

Confidential Computing is encrypting data in use within a secure hardware environment. It completes the data security triangle since data at rest (in storage) and in transit (across networks) are routinely encrypted. Learn how today’s modern data centers are built on the latest hardware which provides isolated “mini-vaults” inside each CPU.

Source: Profian

Link: https://profian.com/white-paper/white-paper-whats-confidential-computing/

Mike Bursell

Every time an application runs on any platform – from the largest mainframe to the smallest IoT device – it executes code as on physical hardware. Given that not all applications, nor all users, are friendly in all cases (and applications that are friendly may be badly written or compromised), there is a need to isolate them from each other and from the host system. Learn how Confidential Computing provides protection from the host on which an application is running.

Source: Profian

Link: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, along with the Confidential Computing Consortium today released findings from a market study by Everest Group which shows the Confidential Computing market is projected to grow at a CAGR of 90%-95% to reach US$ 54 billion in 2026.

Source: Confidential Computing Consortium

Link: https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/10/Everest_Group_-_Confidential_Computing_-_The_Next_Frontier_in_Data_Security_-_2021-10-19.pdf

91% of Enterprises say Confidential Computing Improves Innovation. Securing third-party data has never been more critical for enterprises around the world. With rising cybersecurity concerns, a business’s ability to innovate and grow successfully can be tied closely to its ability to safeguard confidential data and meet legal mandates like GDPR. Arm and Pulse surveyed 250 enterprise IT, engineering, and security executives to find out how they’re protecting third-party data today, what their confidence is in current processes, and how they think confidential computing could improve their security position.

Source: Arm / Pulse

Link: https://armkeil.blob.core.windows.net/developer/Files/pdf/graphics-and-multimedia/confidential-computing-pulse-survey.pdf

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionality, the ability to protect data and code while it is in use is limited in conventional computing infrastructure. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

Source: Confidential Computing Consortium

Link: https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/03/confidentialcomputing_outreach_whitepaper-8-5x11-1.pdf