Advisor

Reducing Concerns with Confidential Computing, Part II: Products and Applications

Posted January 26, 2021 | Technology |
Reducing Concerns with Confidential Computing, Part II
Confidential computing offers a hardware-based solution for protecting data in use, enabling organizations to confidently migrate their sensitive data to cloud platforms by allowing them to maintain complete control of the data and to meet or exceed government and industry regulations for protecting data in cloud environments. This Advisor examines some confidential computing products and applications that organizations have developed by leveraging the technology.
About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.