Skip to main content

12 posts tagged with "White Paper"

View All Tags

Mike Bursell

Confidential Computing is encrypting data in use within a secure hardware environment. It completes the data security triangle since data at rest (in storage) and in transit (across networks) are routinely encrypted. Learn how today’s modern data centers are built on the latest hardware which provides isolated “mini-vaults” inside each CPU.

Source: Profian

Link: https://profian.com/white-paper/white-paper-whats-confidential-computing/

Mike Bursell

Every time an application runs on any platform – from the largest mainframe to the smallest IoT device – it executes code as on physical hardware. Given that not all applications, nor all users, are friendly in all cases (and applications that are friendly may be badly written or compromised), there is a need to isolate them from each other and from the host system. Learn how Confidential Computing provides protection from the host on which an application is running.

Source: Profian

Link: https://profian.com/white-paper/white-paper-managing-insider-risk-with-confidential-computing/

PDF: Managing Insider Risk with Confidential Computing

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, along with the Confidential Computing Consortium today released findings from a market study by Everest Group which shows the Confidential Computing market is projected to grow at a CAGR of 90%-95% to reach US$ 54 billion in 2026.

Source: Confidential Computing Consortium

Link: https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/10/Everest_Group_-_Confidential_Computing_-_The_Next_Frontier_in_Data_Security_-_2021-10-19.pdf

91% of Enterprises say Confidential Computing Improves Innovation. Securing third-party data has never been more critical for enterprises around the world. With rising cybersecurity concerns, a business’s ability to innovate and grow successfully can be tied closely to its ability to safeguard confidential data and meet legal mandates like GDPR. Arm and Pulse surveyed 250 enterprise IT, engineering, and security executives to find out how they’re protecting third-party data today, what their confidence is in current processes, and how they think confidential computing could improve their security position.

Source: Arm / Pulse

Link: https://armkeil.blob.core.windows.net/developer/Files/pdf/graphics-and-multimedia/confidential-computing-pulse-survey.pdf