Fortanix Confidential Computing and Data Security Solutions Now Microsoft IP Co-sell Ready, Available in the Microsoft Azure Marketplace

Fortanix newlogo primary landscape 2
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--Fortanix® Inc., the data-first multi-cloud security company, today announced new and expanded security offerings available in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Customers can now take advantage of the productive and trusted Azure cloud platform, with streamlined deployment and management. Fortanix is also now Microsoft IP Co-sell ready. Fortanix Data Security Manager, a unified platform for protecting enterprise data across cloud and on-premises environments, is now available in Azure Marketplace for the first time. Fortanix Confidential Computing Manager, one of the first solutions for end-to-end management of secure enclaves, is now available as an Azure Managed Application. Both products are now designated as “Microsoft Preferred...

Arm CCA Confidential Computing: Arm Builds Data Center Secure Enclaves

arm hq cambridge
Arm chips for mobile and IoT devices have supported secure enclaves – a concept known as confidential computing – for years. It’s called the Arm TrustZone trusted execution environment, and it’s been available for mobile devices since 2004 and in its M-Class IoT since 2014. The chip designer is now bringing confidential computing to its data center-class chip designs. The Armv9 architecture, launched in March, features Arm CCA (Confidential Compute Architecture). Related: Arm’s New Neoverse V1, N2 Chips Take on Intel in the Data Center MarketSince Arm, based in Cambridge, UK, licenses its designs out to various chipmakers, the release will help democratize confidential computing in data centers, Mark Knight, director of architecture products at Arm, said. Server-chip giants Intel, AMD, and IBM each have their own secure enclave...

The next big thing in cloud computing? Shh… It’s confidential

cloud
The business-driven explosion of demand for cloud-based services has made the need to provide highly secure cloud computing more urgent. Many businesses that work with sensitive data view the transition to the cloud with trepidation, which is not entirely without good reason. For some time, the public cloud has actually been able to offer more protection than traditional on-site environments. Dedicated expert teams ensure that cloud servers, for example, maintain an optimal security posture against external threats. But that level of security comes at a price. Those same extended teams increase insider exposure to private data—which leads to a higher risk of an insider data breach and can complicate compliance efforts. Recent developments in data security technology—in chips, software, and the cloud infrastructure—are changing that. New...

Fortanix Unlocks the Power of Confidential Computing

Fortanix newlogo primary landscape 2
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--Fortanix® Inc., the data-first multicloud security company, today announced that its technology is powering new breakthrough applications of confidential computing. Confidential computing protects applications and the sensitive data they process from unauthorized access and tampering at runtime, extending the security already in place for data at-rest and in-motion across the network. Fortanix was the first company to deliver enterprise applications of confidential computing built on Intel SGX® and today is the leader in enabling real-world uses of this technology. The release of Ice Lake 3rd Gen Intel® Xeon® Scalable processors makes further, large-scale commercial applications of confidential computing possible. Consilient: A More Effective, More Efficient Approach to Anti-Money Laundering and...

How Confidential Computing is dispelling distrust around cloud security

how confidential computing is dispelling distrust around cloud security
Stefan Liesche, Distinguished Engineer at IBM, explains how Confidential Computing is dispelling distrust around cloud security Not all Confidential Computing solutions deliver the same levels of security and flexibility. Businesses have been forced to shift vast amounts of data and workloads into the cloud in response to the global pandemic but concerns around privacy and security remain. Stefan Liesche, Distinguished Engineer at IBM, says that Confidential Computing provides an answer to those fears, but not all solutions are created equal. Moving data to the cloud delivers an array of verified storage and access benefits; it’s therefore little wonder that enterprises of all sizes have developed and adopted cloud strategies in response to the upheaval caused by the Covid-19 pandemic. The measures taken in response...

Arm’s confidential computing uses hardware to ensure security

arm 9
Join Transform 2021 this July 12-16. Register for the AI event of the year. Arm introduced its Armv9 chip platform this week as the first major upgrade for its architecture in a decade. And one of the key pillars was “confidential computing,” a hardware-based security initiative. Arm is a chip architecture company that licenses its designs to others, and its customers have shipped more than 100 billion chips in the past five years. Nvidia is in the midst of acquiring Cambridge, United Kingdom-based Arm for $40 billion, but the deal is waiting on regulatory approvals. During Arm’s press event, CEO Simon Segars said that Armv9’s roadmap introduces the Arm Confidential Compute Architecture (CCA). Confidential computing shields portions of code and data from access or modification while in use, even from privileged software, by performing...

The future of data privacy: confidential computing, quantum safe cryptography take center stage

screenshot 2021 03 11 at 12 20 00
Confidential computing, quantum safe cryptography, and fully homomorphic encryption are set to change the future of data privacy as they make their way from a hypothesis to viable commercial applications.  On Thursday, IBM Research hosted an online program exploring each of these technologies and how they could impact how we securely manage, encrypt, store, and transfer information -- with each solving a different challenge posed by future data privacy concerns.Confidential computingIBM has been working on confidential computing for roughly a decade. The concept behind the technology is to permit clients to retain full privacy and control over data and operational workloads through hardware-level security.  This can include the implementation of "secure enclaves" -- trusted execution environments -- which can manage data and are...

Industry Perspective: Demystifying Confidential Computing

Industry Perspective Demystifying Confidential Computing
By Bruce Kornfeld In computing, data exists in three states: in transit, at rest and in use. Data moving across the network is “in transit,” data residing in some type of storage is “at rest,” and data being processed is “in use.”  As cyberthreats targeted toward network and storage devices are increasingly thwarted by protections that apply to data in transit and at rest, attackers have shifted their focus to data in use. Common attack vectors include memory scraping, CPU side-channel attacks and malware injection.  Confidential Computing is the protection of data in use, through hardware-based Trusted Execution Environments (TEEs). A TEE is defined as an environment that provides a level of assurance of data integrity, data confidentiality and code integrity.  Security strategists must consider all the different layers of possible...