Confidential Computing in the Public Cloud: Why Should You Protect Data in Use for Privacy and Trust?

Confidential Computing in the Public Cloud: Why Should You Protect Data in Use for Privacy and Trust?

This IDC Perspective addresses the needs, benefits, and challenges of adopting confidential computing and offers advice for technology suppliers and buyers. Use cases such as genome sequencing, data analytics, artificial intelligence, Internet of Things (IoT), and fraud analysis across industries such as healthcare/life sciences and finance are growing — and so is the complexity of regulatory compliance, security, and privacy. There is also a greater need for collectively leveraging data sets sourced from peer organizations in the industry while maintaining confidentiality and privacy. These complexities are exacerbated in the world of various deployment locations including on-premises datacenters, private cloud, and public cloud (hybrid cloud and multicloud). Confidential computing is a technology specifically designed to address all of these various needs."The need for regulatory compliance and increased commitment toward privacy is top of mind for all organizations, particularly to those operating in highly regulated industries. Building a strong perception of trust while protecting data and maintaining confidentiality and privacy is key to building a brand, reputation, and trust. Confidential computing is an upcoming and cutting-edge technology that engenders trust in such environments in an effective manner." — Amita Potnis, research director, Future of Trust

Please Note: Extended description available upon request.


Executive Snapshot
Situation Overview
The Real-World Concerns
Security
Compliance
Privacy
Visibility
Cross-Border Collaboration
Cost Efficacy
Protecting Data Throughout Its Life Cycle
Data Life Cycle
Create
Store
Use
Share
Archive
Destroy
How Can Data Be Protected?
Protecting Data in Motion
Protecting Data at Rest
Protecting Data in Use
Confidential Computing
Definition
How Does It Work?
Enclaves
Data Controller
Key Management
Application Life-Cycle Management
Competitive Landscape: Public Cloud Offerings
Amazon Web Services
Google
IBM
Microsoft
Enablers
Fortanix
Red Hat
Intel
AMD
Benefits of Confidential Computing in the Public Cloud
Early Adopters
Use Cases
Industries
Challenges
Advice for the Customer and the Supplier
What Should You Keep in Mind If You Are a Customer?
What Should You Keep in Mind If You Are a Supplier?
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings