Confidential Compute is hailed as the next frontier in security. Today, it is common for servers, storage, and networking infrastructure to protect data at rest and while it is being transmitted. Confidential Compute extends this protection to data residing in memory while it is being used. This new challenge is being solved by broad ecosystem collaboration and engagement. One of the best places to foster this engagement is within the Linux Foundation in the Confidential Compute Consortium. It is here security experts collaborate in an open environment to bring together the building blocks that form solutions centered around Hardware Trusted Execution Environments.
As a premier member of the consortium, Arm sits on the board of governance and participates in the collaborative efforts to support this emerging market.
The Confidential Compute Consortium has released a market study by Everest Group that breaks out the confidential Compute market over the next 5 years. Through interviews with various market stakeholders, the Everest Group collected feedback to create a detailed analysis of the market and presents its findings in a 40 page report.
Some of the most interesting findings include:
For the full details, download the report from the Confidential Compute Consortium website: https://confidentialcomputing.io/white-papers-reports/
Also, please join the Confidential Compute Consortium for a webinar on November 10 to hear the trends in Confidential Compute revealed in the Everest Group Research:
[CTAToken URL = "https://confidentialcomputing.io/trends-in-confidential-computing" target="_blank" text="Join the webinar" class ="green"]