What is Confidential Computing?

Subscribers:
1,210,000
Published on ● Video Link: https://www.youtube.com/watch?v=pMHxLBJ6_UA



Duration: 8:45
15,107 views
0


Learn more about Confidential Computing → http://ibm.biz/confidential-computing-guide
Learn more about Cloud Security → http://ibm.biz/learn-about-cloud-security
Check out IBM Cloud Data Shield → http://ibm.biz/ibm-cloud-data-shield
Check out IBM Hyper Protect Services → http://ibm.biz/ibm-hyper-protect-services

Confidential Computing protects data in use by performing computation in a hardware-based Trusted Execution Environment. These secure and isolated environments prevent unauthorized access or modification of applications and data while they are in use, thereby increasing the security level of organizations that manage sensitive and regulated data.

In this lightboard video, Alex Greer with IBM Cloud, visually breaks down how Confidential Computing works, as well as walking through a few key uses cases that demonstrate how Confidential Computing can help assure your data is protected and confidential.

► Earn a badge with FREE interactive Kubernetes labs → http://ibm.biz/free-k8s-browser-based-labs

Get started on IBM Cloud at no cost → http://ibm.biz/get-started-with-ibm-cloud
Subscribe to see more videos like this in the future → http://ibm.biz/subscribe-now

#ConfidentialComputing #CloudSecurity #DataSecurity







Tags:
Confidential Computing
data at-rest
data in-transit
cloud security
cloud computing
data encryption
data security
trusted execution environment
TEE
encryption keys
Confidential Computing Consortium
IBM
IBM Cloud