Skip to main content

Common Terminology for Confidential Computing

Author: Confidential Computing Consortium

As more companies and open source projects begin to use similar terms to describe similar paradigms that build upon hardware-based, attested Trusted Execution Environments (TEEs), it will be increasingly important that vendors use consistent terminology that describes the ways in which these new capabilities are applied within different functional domains.

Read the Report

Confidential Computing: The Next Frontier in Data Security

Author: Everest Group

The Everest Group leveraged multiple sources of data including proprietary datasets, consultations with key market stakeholders, and contributions from the members of the Confidential Computing Consortium to assess the market. Findings from the market study by Everest Group show the Confidential Computing market is projected to grow at a CAGR of 90%-95% to reach US$54 billion in 2026.

Read the Report

A Technical Analysis of Confidential Computing v1.3

Author: Confidential Computing Consortium

In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit,” data in storage is “at rest,” and data being processed is “in use.” In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever.

Download White Paper
Hardware-Based Trusted Execution for Applications and Data

Confidential Computing: Hardware-Based Trusted Execution for Applications and Data

Author: Confidential Computing Consortium

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionality, the ability to protect data and code while it is in use is limited in conventional computing infrastructure. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

Download White Paper