What is Confidential Computing?

preview_player
Показать описание

Confidential Computing protects data in use by performing computation in a hardware-based Trusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while they are in use, thereby increasing the security level of organizations that manage sensitive and regulated data.

In this lightboard video, Alex Greer with IBM Cloud, visually breaks down how Confidential Computing works, as well as walking through a few key uses cases that demonstrate how Confidential Computing can help assure your data is protected and confidential.

#ConfidentialComputing #CloudSecurity #DataSecurity
Рекомендации по теме
Комментарии
Автор

Having Verify functionality is effective. You not only protecting but detecting external interactions. 😊 for video

sunilg
Автор

This is the next big thing in confidential computing!! Ethernity Cloud!

TheVet
Автор

Nice video! Is confidential computing related to secure coding?

randomlifevideos
Автор

what authentication program are we talking about? As the enclaves are already encrypted and the code/data is decrypted on the fly by the processor - it would make much sense if each enclave page had a separate encryption key.

Atulkumar-dnce
Автор

What about visibility via side channels?

bikashpoudel
Автор

I don't see how to protect against insiders

smitxp