What is Confidential Computing?

Поделиться
HTML-код
  • Опубликовано: 2 дек 2020
  • Learn more about Confidential Computing → ibm.biz/confidential-computing...
    Learn more about Cloud Security → ibm.biz/learn-about-cloud-secu...
    Check out IBM Cloud Data Shield → ibm.biz/ibm-cloud-data-shield
    Check out IBM Hyper Protect Services → ibm.biz/ibm-hyper-protect-serv...
    Confidential Computing protects data in use by performing computation in a hardware-based Trusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while they are in use, thereby increasing the security level of organizations that manage sensitive and regulated data.
    In this lightboard video, Alex Greer with IBM Cloud, visually breaks down how Confidential Computing works, as well as walking through a few key uses cases that demonstrate how Confidential Computing can help assure your data is protected and confidential.
    ► Earn a badge with FREE interactive Kubernetes labs → ibm.biz/free-k8s-browser-based...
    Get started on IBM Cloud at no cost → ibm.biz/get-started-with-ibm-c...
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #ConfidentialComputing #CloudSecurity #DataSecurity
  • НаукаНаука

Комментарии • 10

  • @Jarjarbean75
    @Jarjarbean75 3 года назад +2

    Thanks for teaching, great video!

  • @sunilg8837
    @sunilg8837 3 года назад +2

    Having Verify functionality is effective. You not only protecting but detecting external interactions. 😊 for video

  • @shuhuizhu4366
    @shuhuizhu4366 2 года назад

    Nice work!

  • @randomlifevideos3271
    @randomlifevideos3271 3 года назад +2

    Nice video! Is confidential computing related to secure coding?

  • @TheVet1
    @TheVet1 3 месяца назад

    This is the next big thing in confidential computing!! Ethernity Cloud!

  • @Atulkumar-dn4ce
    @Atulkumar-dn4ce 6 месяцев назад

    what authentication program are we talking about? As the enclaves are already encrypted and the code/data is decrypted on the fly by the processor - it would make much sense if each enclave page had a separate encryption key.

  • @bikashpoudel9921
    @bikashpoudel9921 2 года назад

    What about visibility via side channels?

  • @atul1405
    @atul1405 3 года назад +2

    Cool

  • @smit17xp
    @smit17xp 4 месяца назад

    I don't see how to protect against insiders

  • @EARXHEART
    @EARXHEART Год назад

    Lesson one: Trust level? “0”^10th