Arm Community
Arm Community
  • Site
  • User
  • Site
  • Search
  • User
Arm Community blogs
Arm Community blogs
Servers and Cloud Computing blog Confidential Compute is poised for Exponential growth over the next 5 years
  • Blogs
  • Mentions
  • Sub-Groups
  • Tags
  • Jump...
  • Cancel
More blogs in Arm Community blogs
  • AI blog

  • Announcements

  • Architectures and Processors blog

  • Automotive blog

  • Embedded and Microcontrollers blog

  • Internet of Things (IoT) blog

  • Laptops and Desktops blog

  • Mobile, Graphics, and Gaming blog

  • Operating Systems blog

  • Servers and Cloud Computing blog

  • SoC Design and Simulation blog

  • Tools, Software and IDEs blog

Tags
  • Platform Security Architecture (PSA)
  • Security Architectures
  • CPU Architecture Security Features
  • infrastructure
Actions
  • RSS
  • More
  • Cancel
Related blog posts
Related forum threads

Confidential Compute is poised for Exponential growth over the next 5 years

Marc Meunier
Marc Meunier
October 27, 2021
1 minute read time.

Confidential Compute is hailed as the next frontier in security. Today, it is common for servers, storage, and networking infrastructure to protect data at rest and while it is being transmitted. Confidential Compute extends this protection to data residing in memory while it is being used. This new challenge is being solved by broad ecosystem collaboration and engagement. One of the best places to foster this engagement is within the Linux Foundation in the Confidential Compute Consortium. It is here security experts collaborate in an open environment to bring together the building blocks that form solutions centered around Hardware Trusted Execution Environments.

As a premier member of the consortium, Arm sits on the board of governance and participates in the collaborative efforts to support this emerging market.   

The Confidential Compute Consortium has released a market study by Everest Group that breaks out the confidential Compute market over the next 5 years. Through interviews with various market stakeholders, the Everest Group collected feedback to create a detailed analysis of the market and presents its findings in a 40 page report.

Some of the most interesting findings include:

  • Confidential Compute market is poised for exponential growth with an expected CAGR of between 40% and 95% through 2026.
  • Confidential Compute hardware segment is expected to approximately double every year through 2026.
  • Privacy regulations and incidence of cyber-threats creates geographies that have a higher adoption rate.
  • Regulated industries such as banking, finance, insurance, healthcare, life sciences, public sector, and defense are expected to significantly lead adoption.
  • Public cloud use cases centered around privacy and security make up the largest TAM today with edge and mobile use cases taking up more share in the future.

For the full details, download the report from the Confidential Compute Consortium website: https://confidentialcomputing.io/white-papers-reports/

Also, please join the Confidential Compute Consortium for a webinar on November 10  to hear the trends in Confidential Compute revealed in the Everest Group Research:

Join the webinar

Anonymous
Servers and Cloud Computing blog
  • Refining MurmurHash64A for greater efficiency in Libstdc++

    Zongyao Zhang
    Zongyao Zhang
    Discover how tuning MurmurHash64A’s memory access pattern yields up to 9% faster hashing performance.
    • October 16, 2025
  • How Fujitsu implemented confidential computing on FUJITSU-MONAKA with Arm CCA

    Marc Meunier
    Marc Meunier
    Discover how FUJITSU-MONAKA secures AI and HPC workloads with Arm v9 and Realm-based confidential computing.
    • October 13, 2025
  • Pre-silicon simulation and validation of OpenBMC + UEFI on Neoverse RD-V3

    odinlmshen
    odinlmshen
    In this blog post, learn how to integrate virtual BMC and firmware simulation into CI pipelines to speed bring-up, testing, and developer onboarding.
    • October 13, 2025