Skip to main content

Confidential Computing: The Next Frontier in Data Security

Author: Everest Group

The Everest Group leveraged multiple sources of data including proprietary datasets, consultations with key market stakeholders, and contributions from the members of the Confidential Computing Consortium to assess the market. Findings from the market study by Everest Group show the Confidential Computing market is projected to grow at a CAGR of 90%-95% to reach US$54 billion in 2026.

Read the Report

A Technical Analysis of Confidential Computing v1.2

Author: Confidential Computing Consortium

In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit,” data in storage is “at rest,” and data being processed is “in use.” In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever.

Download White Paper
Hardware-Based Trusted Execution for Applications and Data

Confidential Computing: Hardware-Based Trusted Execution for Applications and Data

Author: Confidential Computing Consortium

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Additionality, the ability to protect data and code while it is in use is limited in conventional computing infrastructure. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

Download White Paper