An Easy Path to Confidential Computing

To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today.

The next webcast in our Confidential Computing series is “How to Easily Deploy Confidential Computing.” It will provide insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion on July 28, 2021 will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure.  Presenting will be Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss:

·       What would it take to build-your-own Confidential Computing solution?

·       Emergence of easily deployable, cost-effective Confidential Computing solutions

·       Real-world usage examples and key technical, business and investment insights

Hosted by the SNIA Cloud Storage Technologies Initiative (CSTI), this webinar acts as a grand finale in our three-part Confidential Computing series.  Earlier we covered an introduction What is Confidential Computing and Why Should I Care? and how Confidential Computing works in multi-tenant cloud environments “Confidential Computing: Protecting Data in Use.”   Please join us on July 28th for this exciting discussion.

Leave a Reply

Your email address will not be published. Required fields are marked *