Introduction
What is Confidential Computing
A technology for protecting sensitive data in an Application during processing.
Sensitive data is usually stored in memory in plaintext during processing, so there is a risk of exfiltration of sensitive information in the event of an attack on memory. Confidential Computing uses Intel SGX to encrypt data in memory even during processing to reduce the risk of leaking confidential information.
The Importance of Confidential Computing
Data exists in three states: at rest, in use, and in transit. Data being stored is "at rest", data being processed is "in use", and data passing through the network is "in transit".
Encryption of data at rest and in transit over a network has become commonplace, but encryption of data "in use" is still relatively uncommon. Data is vulnerable to unauthorized access and tampering at runtime. Therefore, it is important to protect data “in use” with Confidential Computing to provide complete security throughout the data lifecycle.
Product Summary
Confidential Computing Manager™
● Confidential Computing Manager is the easiest solution to provide application protection.
● We also provide an integrated platform for batch management of apps.
● Also, existing applications can be used without modifying, rewriting, or recompiling.
Use Case
- Protecting Healthcare AI
Inquiry / Quotation
If you have any questions about this product or would like a quote, please contact us using the form below.
Fortanix Manufacturer Information Top
If you want to return to Fortanix manufacturer information TOP, please click below.