• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Technology Events 2026-2027
  • Sponsored Post
  • Technology Markets
  • About
    • GDPR
  • Contact

Intel Editorial: Intel Joins Industry Consortium to Accelerate Confidential Computing

August 21, 2019 By admin Leave a Comment

Intel to Contribute Intel SGX SDK to New Community to Help Simplify Secure Enclave Development and Deployment

The following is an opinion editorial by Lorie Wigle of Intel Corporation.

Leaders in information and infrastructure security are well versed in protecting data at-rest or in-flight through a variety of methods. However, data being actively processed in memory is another matter. Whether running on your own servers on-prem, in an edge deployment, or in the heart of a cloud service provider’s data center, this “in-use” data is almost always unencrypted and potentially vulnerable.

Intel’s commitment to helping customers and the ecosystem at large with data protection is why we and other industry leaders are coming together to form a new Confidential Computing Consortium under the Linux Foundation. We’re proud to be a founding member of this new industry group dedicated to making confidential computing practices, such as the protection of data in-use, easier to adopt in today’s multi-cloud world.

Confidential Computing Protects Data In-Use

Confidential computing may take multiple forms, but early use cases rely on trusted execution environments (TEE), also called trusted enclaves, where data and operations are isolated and protected from any other software, including the operating system and cloud service stack. Combined with encrypted data storage and transmission methods, TEEs can create an end-to-end protection architecture for your most sensitive data.

Enterprises and cloud service providers can apply confidential computing to a wide range of workloads. The most popular of the early use cases use the trusted enclave for key protection and crypto-operations. But trusted enclaves can be used to protect any type of highly sensitive information. For example, healthcare analytics can be performed so that the enclave protects any data that may contain personally identifiable information, thus keeping results anonymous.

Companies that wish to run their applications in the public cloud but don’t want their most valuable software IP visible to other software or the cloud provider can run their proprietary algorithms inside an enclave. Multiple untrusted parties can share transactions but protect their confidential or proprietary data from the other parties by using enclaves. Any time sensitive data is in use, there may be an opportunity to use confidential computing to better protect it.

Intel SGX – The Hardware Engine Powering Confidential Computing

The Confidential Computing Consortium is initially focused on common programming models and enclave portability, but the Consortium doesn’t prescribe the hardware mechanism necessary for creating and protecting the enclave. That’s where Intel® Software Guard Extensions (Intel® SGX) comes in.

Intel SGX is a hardware-based technology that helps protect data in-use by establishing protected enclaves in memory so only authorized application code can access sensitive data. Unlike full memory encryption technologies that leave the data within the attack surface of the OS and cloud stack, Intel SGX allows a specific application to create its own protected enclave with a direct interface to the hardware, limiting access and minimizing the overall performance impact for both the application and any other virtual machines (VMs) or tenants on the server.

Intel SGX provides hardware-based encryption for data in-use protection at the application level with the smallest attack surface. Intel SGX is available today on Intel® Xeon® processor E-2100 family, and is used in confidential computing services from Microsoft Azure*, IBM Cloud Data Guard*, Baidu*, Alibaba Cloud* and Equinix*. Later this year, we will release a PCI-Express add-in card that will enable Intel SGX in multi-socket Intel Xeon Scalable servers. And Intel SGX will continue to be rolled out across our mainstream Xeon platforms in upcoming generations.

As part of today’s announcement of the new Confidential Computing Consortium, I am pleased to share that we are contributing the Intel SGX SDK to this new community to help simplify secure enclave development and deployment.

The launch of the Confidential Computing Consortium is a big step in bringing this powerful security capability to a broader audience, and we are committed to working with our ecosystem customers to ease use and portability of confidential computing for developers and IT pros. We invite developers to learn about how to integrate Intel SGX into their applications and cloud services today, and the future of the consortium at its website.

Lorie Wigle is vice president in the Architecture, Graphics and Software Group and general manager of Platform Security Product Management at Intel Corporation.

About Intel
Intel (NASDAQ: INTC), a leader in the semiconductor industry, is shaping the data-centric future with computing and communications technology that is the foundation of the world’s innovations. The company’s engineering expertise is helping address the world’s greatest challenges as well as helping secure, power and connect billions of devices and the infrastructure of the smart, connected world – from the cloud to the network to the edge and everything in between. Find more information about Intel at newsroom.intel.com and intel.com.

Filed Under: Tech Tagged With: Confidential Computing, Intel

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Preply Reaches $1.2B Valuation After $150M Series D to Scale Human-Led, AI-Enhanced Language Learning
  • Datarails Raises $70M Series C to Turn the CFO’s Office into an AI-Native Nerve Center
  • Emergent Raises $70M Series B as AI Turns Software Creation Into an Entrepreneurial Commodity
  • Fujifilm Introducing SX400: A Long-Range Camera Designed for the Real World
  • D-Wave Becomes the First Dual-Platform Quantum Computing Company After Quantum Circuits Acquisition
  • Wasabi Technologies Secures $70M to Fuel the Next Phase of AI-Ready Cloud Storage
  • Samsung Maintenance Mode: The Quiet Feature That Actually Changed How I Buy Phones
  • Miro AI Workflows Launch: From Whiteboard Chaos to Enterprise-Grade Deliverables
  • 10 Breakthrough Technologies of 2026
  • Samsung Walked Away From Long Zoom — And Left a Gap It Once Owned

Media Partners

  • Market Analysis
  • Cybersecurity Market
Nvidia’s China Problem Is Self-Inflicted, and Washington Should Stop Pretending Otherwise
USPS and the Theater of Control: How Government Freezes Failure in Place
Skild AI Funding Round Signals a Shift Toward Platform Economics in Robotics
Saks Sucks: Luxury Retail’s Debt-Fueled Mirage Collapses
Alpaca’s $1.15B Valuation Signals a Maturity Moment for Global Brokerage Infrastructure
The Immersive Experience in the Museum World
The Great Patent Pause: 2025, the Year U.S. Innovation Took a Breath
OpenAI Acquires Torch, A $100M Bet on AI-Powered Health Records Analytics
Iran’s Unreversible Revolt: When Internal Rupture Meets External Signals
Global Robotics Trends 2026: Where Machines Start Thinking for Themselves
Lumu’s 2026 Compromise Report: Why Cybersecurity Has Entered the Age of Silent Breaches
Novee Emerges from Stealth, 2025, Offensive Security at Machine Speed
depthfirst Raises $40M Series A to Build AI-Native Software Defense
Bitwarden Doubles Down on Identity Security as Passwords Finally Start to Lose Their Grip
Cloudflare App Innovation Report 2026: Why Technical Debt Is the Real AI Bottleneck
CrowdStrike Acquires Seraphic Security: Browser Security Becomes the New Cyber Frontline
Hedge Funds Quietly Rewrite Their Risk Playbook as Cybersecurity Becomes Non-Negotiable
Torq Raises $140M Series D, Reaches $1.2B Valuation as Agentic AI Redefines the SOC
CrowdStrike–SGNL Deal Signals Identity’s Promotion to the Center of Cyber Defense
CrowdStrike Backs the Next Wave of AI-Native Cybersecurity Startups

Media Partners

  • Market Research Media
  • Technology Conferences
BBC and the Gaza War: How Disproportionate Attention Reshapes Reality
Parallel Museums: Why the Future of Art Might Be Copies, Not Originals
ClickHouse Series D, The $400M Bet That Data Infrastructure, Not Models, Will Decide the AI Era
AI Productivity Paradox: When Speed Eats Its Own Gain
Voice AI as Infrastructure: How Deepgram Signals a New Media Market Segment
Spangle AI and the Agentic Commerce Stack: When Discovery and Conversion Converge Into One Layer
PlayStation and the Quiet Power Center of a $200 Billion Gaming Industry
Adobe FY2025: AI Pulls the Levers, Cash Flow Leads the Story
Canva’s 2026 Creative Shift and the Rise of Imperfect-by-Design
fal Raises $140M Series D: Scaling the Core Infrastructure for Real-Time Generative Media
Humanoid Robot Forum 2026, June 22–25, Chicago
Supercomputing Asia 2026, January 26–29, Osaka International Convention Center, Japan
Chiplet Summit 2026, February 17–19, Santa Clara Convention Center, Santa Clara, California
HumanX, 22–24 September 2026, Amsterdam
CES 2026, January 7–10, Las Vegas
Humanoids Summit Tokyo 2026, May 28–29, 2026, Takanawa Convention Center
Japan Pavilion at CES 2026, January 6–9, Las Vegas
KubeCon + CloudNativeCon Europe 2026, 23–26 March, Amsterdam
4YFN26, 2–5 March 2026, Fira Gran Via — Barcelona
DLD Munich 26, January 15–17, Munich, Germany

Copyright © 2022 Technologies.org

Media Partners: Market Analysis & Market Research and Exclusive Domains, Photography