Security
Determine security ramifications to protect personal data and information
123 Discussions

Real-World Stories: Use Cases from the Confidential Computing Consortium

RonP
Employee
1 0 4,210

As a founding member of the Confidential Computing Consortium (CCC), Intel is excited to see the CCC publish a comprehensive use case report. “The Case for Confidential Computing” showcases real-world stories and novel ways organizations are leveraging Confidential Computing to protect data in use and ensure security and privacy across various environments.

cc-cover.png

The Importance of Confidential Computing

Confidential Computing is revolutionizing the way we handle sensitive data by providing security measures that were previously unattainable. By protecting data in the Trusted Execution Environment during processing, Confidential Computing ensures that you can confidently migrate data to the cloud, collaborate with multiple parties, strengthen data compliance & sovereignty, and harden application security & IP protection.

Real-World Applications

The CCC’s use case report highlights six dynamic applications across industries. From healthcare to finance, these real-world examples illustrate how organizations are achieving enhanced security and compliance while maintaining performance and functionality.

  • Confidential Data Clean Rooms Uncover Efficient Marketing Outcomes
  • Secure Data Processing Enables Public Cloud Adoption
  • Attestation and Secure Enclaves Strengthen Global Data Protection and Compliance
  • Confidential Computing Boosts Confidential AI for Enterprises
  • Multiparty Data Collaboration Helps Combat Money Laundering
  • Privacy-Preserving Data Aggregation Leads to Better Healthcare Outcomes

Why Intel is Committed to Confidential Computing

As a founding member of the CCC, Intel is committed to fostering an ecosystem where data can be securely processed in any environment. Since launching Intel® Software Guard Extensions (Intel® SGX) in 2018, we’ve been dedicated to advancing and scaling confidential computing solutions globally. We continue to innovate and expand our portfolio to provide more advanced security options that meet your needs—including multi-cloud trust services, virtual machine (VM) isolation, and remote attestation—while continuously updating platforms to address vulnerabilities.

Intel’s Confidential Computing solutions are designed to meet the diverse needs of modern enterprises. Whether it’s on-prem or at the edge, Intel’s technologies help ensure that data and computation are protected throughout their lifecycle.

Join the Movement

The publication of the CCC’s Use Case Report is a testament to the growing adoption and impact of Confidential Computing. Intel is proud to be part of this journey, contributing to a future where data privacy and security are paramount. We are excited to see how these use cases will inspire more organizations to embrace Confidential Computing, unlocking new possibilities and achieving greater trust in their digital operations.

We encourage you to explore “The Case for Confidential Computing” to discover how Confidential Computing transforms the way we secure data in our everyday lives.

 

For more information about Intel’s Confidential Computing Solutions, visit intel.com/confidentialcomputing. To learn more about the Confidential Computing Consortium, visit confidentialcomputing.io

About the Author
Ron Perez is an Intel Fellow and Chief Security Architect in the Office of the CTO at Intel. He is responsible for overall Intel security architecture and cross-business unit security technology roadmap alignment, with a focus on Confidential Computing and platform security for the disaggregated, heterogeneous, and distributed data center. He leads a team of senior technology leaders driving Intel's foundational security technologies for server platforms and roots-of-trust, supply chain and life cycle integrity, and trusted execution environments in collaboration with Intel Labs and world-wide strategy, planning, engineering, design, and validation teams. An industry veteran, Ron joined Intel in 2017 with a breadth of experience spanning security, semiconductors, and cloud computing. Most recently, he was Vice President of Security Research at Visa Inc., and has held roles as Fellow and Chief Technology Officer in the Cryptography Research Division of Rambus Inc., Senior Fellow and head of security architecture at Advanced Micro Devices Inc., and earlier in his career, as a senior manager and senior technical staff member at IBM's T.J. Watson Research Center. Perez earned a bachelor's degree in computer science from the University of Texas at Austin. He has been granted more than thirty U.S. patents—and more internationally— related to various aspects of security, with additional patents pending. He is also the author or co-author of more than 20 publications. He currently serves as the Chairman of the Linux Foundation’s Confidential Computing Consortium and is Intel’s board of directors representative for the Trusted Computing Group.