How to Easily Deploy Confidential Computing

Logo
Presented by

Steve Van Lare, Anjuna; Anand Kashyap, Fortanix; Michael Hoard Intel

About this talk

To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Presenting are Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss: · What would it take to build-your-own Confidential Computing solution? · Emergence of easily deployable, cost-effective Confidential Computing solutions · Real world usage examples and key technical, business and investment insights After you watch the webcast, check out the Q&A blog at https://bit.ly/3DqFKj6
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (119)
Subscribers (30944)
The Enterprise Storage channel has the most up-to-date, relevant content for storage and infrastructure professionals. As data centers evolve with big data, cloud computing and virtualization, organizations are going to need to know how to make their storage more efficient. Join this channel to find out how you can use the most current technology to satisfy your business and storage needs.