WHAT IS CONFIDENTIAL COMPUTING?

  • As the digital transformation continues to accelerate around the globe, security and privacy have struggled to keep pace.

    Encryption only goes so far. It can prevent unauthorized eyes’ viewing and using sensitive data while it’s in storage and during transmission. But while that data is being processed in a CPU – “in use” — it is vulnerable, because it’s not encrypted during that time. Thwarted by encryption, hackers are now focusing their efforts on breaching data during this time, when it’s exposed.

    Digitizing alone isn’t enough to transform business processes in today’s privacy-focused world. Encryption technologies, too, need transforming. For a growing number of enterprises, confidential computing is bridging the encryption gap.

READ MORE