How to Easily Deploy Confidential Computing

Logo
Presented by

Steve Van Lare, Anjuna; Anand Kashyap, Fortanix; Michael Hoard Intel

About this talk

To counter the ever-increasing likelihood of catastrophic disruption and cost due to enterprise IT security threats, data center decision makers need to be vigilant in protecting their organization’s data. Confidential Computing is architected to provide security for data in use to meet this critical need for enterprises today. This webcast provides insight into how data center, cloud and edge applications may easily benefit from cost-effective, real-world Confidential Computing solutions. This educational discussion will provide end-user examples, tips on how to assess systems before and after deployment, as well as key steps to complete along the journey to mitigate threat exposure. Presenting are Steve Van Lare (Anjuna), Anand Kashyap (Fortanix), and Michael Hoard (Intel), who will discuss: · What would it take to build-your-own Confidential Computing solution? · Emergence of easily deployable, cost-effective Confidential Computing solutions · Real world usage examples and key technical, business and investment insights After you watch the webcast, check out the Q&A blog at https://bit.ly/3DqFKj6
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (96)
Subscribers (42497)
With virtualization and cloud computing revolutionizing the data center, it's time that the network has its own revolution. Join the Network Infrastructure channel on all the hottest topics for network and storage professionals such as software-defined networking, WAN optimization and more to maintain performance and service in your infrastructure