Achieve Tip-of-the-Spear Security with Confidential Computing

Logo
Presented by

Mark Bower, VP Product Management, Anjuna Security

About this talk

Organizations looking to reap the benefits of public cloud economics are still challenged by the risks of data exposure associated with having shared responsibility with the cloud service provider over their infrastructure. The crude reality is that anyone or any process with root access can easily exfiltrate data, code and secrets that sit unencrypted in running processes, regardless of other methods of protection and encryption. These concerns continue to keep many modern organizations from migrating highly sensitive workloads to the cloud, which in many cases stalls their ability to innovate at maximum capacity. A new innovative technology - Confidential Computing - offers a breakthrough approach to completing the data protection trifecta by encrypting data in-use using hardware-level isolation technologies embedded in modern CPUs, thereby achieving “tip-of-the-spear” security. As cloud service providers embrace these advancements and make them widely available, enterprises are looking to understand 1. What are the best use cases to begin their Confidential Computing journey, and 2. What are available software tools to adopt and abstract this new hardware-level paradigm in order to minimize complexity, optimize performance, and maximize flexibility to scale in a hybrid cloud world. Join Mark Bower, VP of Product at Anjuna Security, for this keynote presentation on the fundamentals of Confidential Computing.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (904)
Subscribers (65204)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa