What is Confidential Computing?
HTML-код
- Опубликовано: 2 дек 2020
- Learn more about Confidential Computing → ibm.biz/confidential-computing...
Learn more about Cloud Security → ibm.biz/learn-about-cloud-secu...
Check out IBM Cloud Data Shield → ibm.biz/ibm-cloud-data-shield
Check out IBM Hyper Protect Services → ibm.biz/ibm-hyper-protect-serv...
Confidential Computing protects data in use by performing computation in a hardware-based Trusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while they are in use, thereby increasing the security level of organizations that manage sensitive and regulated data.
In this lightboard video, Alex Greer with IBM Cloud, visually breaks down how Confidential Computing works, as well as walking through a few key uses cases that demonstrate how Confidential Computing can help assure your data is protected and confidential.
► Earn a badge with FREE interactive Kubernetes labs → ibm.biz/free-k8s-browser-based...
Get started on IBM Cloud at no cost → ibm.biz/get-started-with-ibm-c...
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#ConfidentialComputing #CloudSecurity #DataSecurity Наука
Thanks for teaching, great video!
Having Verify functionality is effective. You not only protecting but detecting external interactions. 😊 for video
Nice work!
Nice video! Is confidential computing related to secure coding?
This is the next big thing in confidential computing!! Ethernity Cloud!
what authentication program are we talking about? As the enclaves are already encrypted and the code/data is decrypted on the fly by the processor - it would make much sense if each enclave page had a separate encryption key.
What about visibility via side channels?
Cool
I don't see how to protect against insiders
Lesson one: Trust level? “0”^10th