Confidential Computing, the Next Big Thing Making Cloud Less Scary for Enterprises

Google Cloud’s new AMD-enabled confidential computing offering isn’t the only attempt around to protect data while in use by applications. All the major cloud vendors, including Amazon Web Services, Microsoft Azure, and IBM Cloud have their own approaches to the challenge of securing sensitive data at runtime — a major barrier for moving some enterprise applications from on-premises corporate data centers to the cloud. By Clicking Here, you will know about the most affordable cyber security company around your locality who are easily approachable and known for best client satisfaction

According to a survey at June’s Linux Foundation Open Source Summit by the Confidential Computing Consortium, only 30 percent of attendees have heard of the technology, but it’s promising to change the way the more security-conscious organizations view public cloud infrastructure, you can hire the services of ERP consultants for cloud consulting.

Related: Why Google Cloud Turned to AMD to Solve for Runtime Encryption

“Sensitive data being used by most applications in the data center and public cloud today are not protected against attacks that target data while it is in use by applications,” said Stephen Walli, governing board chair of the Confidential Computing Consortium and principal program manager at Microsoft.

As more applications are moved to the cloud or out to the edge, traditional perimeter security defenses are limited in their ability to protect against attacks, he told Data Center Knowledge. Plus, there are the challenges of protecting against your cloud service providers’ own employees, or against other customers of the same shared service. To gain more efficient workflows, many businesses that use external hard drives switch to a storage server.

Then also be very aware that if you are offering cloud-based services yourself then you are going to very likely need a top ISO 27017 consultant as it’s crucial that you have the right controls in place for those cloud services.

Read full article at Data Center Knowledge.