The Linux Foundation Projects
Skip to main content
Announcement

Fujitsu Strengthens Commitment to Secure Computing: Joins Confidential Computing Consortium as General Member

By February 20, 2024No Comments2 min read

Fujitsu has strengthened its commitment to secure computing by joining the Confidential Computing Consortium as a General Member. It reflects its dedication to leading-edge technology and recognizes security’s paramount importance as a global information and communication technology (ICT) leader in the digital age.

Through active participation in the consortium, Fujitsu becomes a key player in shaping the future of secure computing, collaborating with industry leaders to contribute expertise and resources to develop open-source technologies enhancing data security and privacy.

This membership marks a crucial step in Fujitsu’s journey to fortify data security, establishing itself as a secure and confidential computing leader alongside other industry leaders. As the consortium drives innovation, we anticipate transformative advancements, leading to a redefined data security landscape.

Confidential Computing Consortium unites industry leaders to advance confidential computing, focusing on secure data-in-use and safeguarding sensitive information during processing. Fujitsu’s alignment with like-minded organizations underscores its commitment to data security through open-source technologies.

Confidential computing introduces a paradigm shift in securing sensitive data, addressing the need to protect data during processing, in addition to traditional measures for data at rest and in transit. This approach ensures encryption and protection of sensitive information during active use.

The consortium provides a collaborative platform for members to share insights, expertise, and resources. Fujitsu’s involvement signifies a shared commitment to fostering innovation and driving advancements in confidential computing. As technology evolves, collaboration becomes crucial in addressing complex challenges and overcoming emerging threats.

Learn more about the Confidential Computer Consortium and how to get involved.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.