Sorry, you need to enable JavaScript to visit this website.

News & Blogs

Level Up: Get End-to-end Machine Identity Lifecycle Protection with Intel® SGX

One important challenge for many organizations has been to secure the private key that is used to prove the authenticity of the server identified by a certificate. Often, these private keys are protected in a suboptimal manner that incurs prohibitively expensive overhead or undesirably high risk. Combined with machine identity management, Intel® Software Guard Extensions  (Intel® SGX)...

Trusted Container Platform with a Five-Level Security Model

In this blog, we propose a trusted container framework with innovative technologies to ensure the security of your container platform. With a five-level model, the proposed framework can help address security concerns in all hardware and software levels of a container-based platform. We first introduce the five levels of the security model by describing the building blocks of a trusted container...

Confidential Computing—the emerging paradigm for protecting data in-use

As computing moves to span multiple environments—from on-prem to public cloud to edge computing—organizations need security controls that can safeguard sensitive intellectual property (IP) and workload data wherever the data resides. Highly regulated applications and mission critical applications need data protection through all its modalities—at-rest, in-transit and in-use, for companies to...

Policy Based Governance in Trusted Container Platform

Virtualization and containerization significantly benefit efficiency, adaptability, and scalability of workloads. However, workloads may be hosted on an environment sharing a pool of physical platforms in a data center or multi-tenant cloud. There are security concerns on whether workloads are being run on platforms that are trustworthy, in terms of the integrity of the platform, its...