What is Confidential Computing and Why Should I Care?
In the "arms race" of security, new defensive tactics are always needed. One significant approach is Confidential Computing: a technology that can isolate data and execution in a secure space on a system, which takes the concept of security to new levels. This SNIA Cloud Storage Technologies Initiative (CSTI) webcast provides an introduction and explanation of Confidential Computing and features a panel of industry architects responsible for defining Confidential Compute. It's a lively conversation on topics including:
• The basics of hardware-based Trusted Execution Environments (TEEs) and how they work to enable confidential computing
• How to architect solutions based around TEEs
• How this foundation fits with other security technologies
• Adjacencies to storage technologies
Presented by Mike Bursell, Co-founder, Enarx Project; David Kaplan, AMD; Ronald Perez, Intel; Jim Fister, The Decision Place
After you watch the video, check out the Q&A blog: https://bit.ly/2SYwxw9
Видео What is Confidential Computing and Why Should I Care? канала SNIAVideo
• The basics of hardware-based Trusted Execution Environments (TEEs) and how they work to enable confidential computing
• How to architect solutions based around TEEs
• How this foundation fits with other security technologies
• Adjacencies to storage technologies
Presented by Mike Bursell, Co-founder, Enarx Project; David Kaplan, AMD; Ronald Perez, Intel; Jim Fister, The Decision Place
After you watch the video, check out the Q&A blog: https://bit.ly/2SYwxw9
Видео What is Confidential Computing and Why Should I Care? канала SNIAVideo
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Object Storage: What, How and Why](https://i.ytimg.com/vi/t-yMawgRuQQ/default.jpg)
![Accelerate Disaggregated Storage to Optimize Data-Intensive Workloads](https://i.ytimg.com/vi/bGUa3K_jVss/default.jpg)
![How to Easily Deploy Confidential Computing](https://i.ytimg.com/vi/KtaIanXoqbw/default.jpg)
![What is Cloud Computing with AWS?](https://i.ytimg.com/vi/ybcV0sJ_T_I/default.jpg)
![Mayim Bialik and Yuval Noah Harari in conversation](https://i.ytimg.com/vi/efohpI3sOCI/default.jpg)
![What is IoT? Understanding IoT Protocols, Clients and Management](https://i.ytimg.com/vi/WtRpFLx34BY/default.jpg)
![CXL™ 2.0: A High-Speed Interconnect for Persistent Memory Challenges](https://i.ytimg.com/vi/jaedlY6W1C4/default.jpg)
![SNIA Swordfish: Expanding to NVMe / NVMe-oF and Storage Fabric Management](https://i.ytimg.com/vi/RyqT2rNxB-k/default.jpg)
![Introduction to Cloud Computing](https://i.ytimg.com/vi/QYzJl0Zrc4M/default.jpg)
![Access control and ID mapping on the Linux SMB Client](https://i.ytimg.com/vi/5fGMv9RuZF4/default.jpg)
![What is subnetting and why to subnet](https://i.ytimg.com/vi/-yz3FV8WliU/default.jpg)
![Should I work in Cyber Security?](https://i.ytimg.com/vi/Sb15lXb06bk/default.jpg)
![Enarx for Confidential Computing - DevConf.CZ 2021](https://i.ytimg.com/vi/kheJFhljEck/default.jpg)
![Why Silence Is Powerful - 5 Secret Advantages of Being Silent](https://i.ytimg.com/vi/Xj3w8eKhH3k/default.jpg)
![What is the Internet of Things? And why should you care? | Benson Hougland | TEDxTemecula](https://i.ytimg.com/vi/_AlcRoqS65E/default.jpg)
![Mergers and Acquisitions Explained: A Crash Course on M&A](https://i.ytimg.com/vi/WBHzCDgEtVQ/default.jpg)
![What I am learning from my white grandchildren -- truths about race | Anthony Peterson | TEDxAntioch](https://i.ytimg.com/vi/u5GCetbP7Fg/default.jpg)
![The Hype Over Quantum Computers, Explained](https://i.ytimg.com/vi/u1XXjWr5frE/default.jpg)
![Protect Privacy in a Data-Driven World: Privacy-Preserving Machine Learning](https://i.ytimg.com/vi/51GwgJidluM/default.jpg)
![EDSFF for Storage, Memory and Acceleration](https://i.ytimg.com/vi/J8FN4SxqQd8/default.jpg)