Rising to the Challenge — Data Security with Intel Confidential Computing

Author: Anil Rao, Vice President and General Manager, Systems Architecture and Engineering Office of the CTO


Every day, we’re assailed with reports of new data breaches, trans-national hacking and ransomware attacks. It paints a dark picture, indeed. But what keeps me optimistic that the best days in security technology still lay ahead of us is the progress Intel, along with our customers and partners, are making in Confidential Computing.

The industry has long offered technologies like disk and network encryption to protect data at-rest and in-transit, but protecting data in-use proved a more elusive challenge — until we launched Intel® Software Guard Extensions (SGX). Intel® SGX is the most-deployed, researched and hardened trusted execution environment (TEE) for protecting data while it is actively being processed in memory, and remains a cornerstone of our Confidential Computing roadmap for Intel Xeon platforms. Deployed in the data center, the network or at the edge, Intel SGX helps protect data in-use via application isolation technology. By protecting selected code and data from modification in hardened enclaves, organizations can enhance security, data privacy and confidentiality.

Solving Data Privacy Challenges with Intel SGX

Innovative organizations have up-leveled their security and launched new growth-oriented services using Confidential Computing powered by Intel SGX. These include a wide range of industries, from financial services and healthcare to government services and retail. Among the top uses of Confidential Computing are services where multiple parties can collaborate and benefit from a pooled data set while keeping each party’s data private. For example, the University of California-San Francisco used an Intel SGX-based service to validate AI-enhanced medical device algorithms with multiple third-party data sets while preserving patient privacy and protecting the AI model’s IP. Magnit (retail), Swiss Re (insurance), Leidos (pandemic response) and others are growing their businesses today using multi-party collaboration while protecting everyone’s data confidentiality.

For More Information

this story continues with more details on Intel’s Community site here.

Notices and Disclaimers:

​Intel technologies may require enabled hardware, software or service activation.​​​​​​​

​No product or component can be absolutely secure. Your costs and results may vary.

​Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.​ ​

© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.​​

Rising to the Challenge — Data Security with Intel Confidential Computing was originally published in Intel Tech on Medium, where people are continuing the conversation by highlighting and responding to this story.

Categories: Intel

Subscribe to recieve updates

Generated by Feedzy