• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Technologies.org

Technology Trends: Follow the Money

  • Technology Events 2025-2026
  • Sponsored Post
    • Make a Contribution
  • Technology Jobs
  • Technology Markets
  • About
    • GDPR
  • Contact

Intel Editorial: Intel Joins Industry Consortium to Accelerate Confidential Computing

August 21, 2019 By admin Leave a Comment

Intel to Contribute Intel SGX SDK to New Community to Help Simplify Secure Enclave Development and Deployment

The following is an opinion editorial by Lorie Wigle of Intel Corporation.

Leaders in information and infrastructure security are well versed in protecting data at-rest or in-flight through a variety of methods. However, data being actively processed in memory is another matter. Whether running on your own servers on-prem, in an edge deployment, or in the heart of a cloud service provider’s data center, this “in-use” data is almost always unencrypted and potentially vulnerable.

Intel’s commitment to helping customers and the ecosystem at large with data protection is why we and other industry leaders are coming together to form a new Confidential Computing Consortium under the Linux Foundation. We’re proud to be a founding member of this new industry group dedicated to making confidential computing practices, such as the protection of data in-use, easier to adopt in today’s multi-cloud world.

Confidential Computing Protects Data In-Use

Confidential computing may take multiple forms, but early use cases rely on trusted execution environments (TEE), also called trusted enclaves, where data and operations are isolated and protected from any other software, including the operating system and cloud service stack. Combined with encrypted data storage and transmission methods, TEEs can create an end-to-end protection architecture for your most sensitive data.

Enterprises and cloud service providers can apply confidential computing to a wide range of workloads. The most popular of the early use cases use the trusted enclave for key protection and crypto-operations. But trusted enclaves can be used to protect any type of highly sensitive information. For example, healthcare analytics can be performed so that the enclave protects any data that may contain personally identifiable information, thus keeping results anonymous.

Companies that wish to run their applications in the public cloud but don’t want their most valuable software IP visible to other software or the cloud provider can run their proprietary algorithms inside an enclave. Multiple untrusted parties can share transactions but protect their confidential or proprietary data from the other parties by using enclaves. Any time sensitive data is in use, there may be an opportunity to use confidential computing to better protect it.

Intel SGX – The Hardware Engine Powering Confidential Computing

The Confidential Computing Consortium is initially focused on common programming models and enclave portability, but the Consortium doesn’t prescribe the hardware mechanism necessary for creating and protecting the enclave. That’s where Intel® Software Guard Extensions (Intel® SGX) comes in.

Intel SGX is a hardware-based technology that helps protect data in-use by establishing protected enclaves in memory so only authorized application code can access sensitive data. Unlike full memory encryption technologies that leave the data within the attack surface of the OS and cloud stack, Intel SGX allows a specific application to create its own protected enclave with a direct interface to the hardware, limiting access and minimizing the overall performance impact for both the application and any other virtual machines (VMs) or tenants on the server.

Intel SGX provides hardware-based encryption for data in-use protection at the application level with the smallest attack surface. Intel SGX is available today on Intel® Xeon® processor E-2100 family, and is used in confidential computing services from Microsoft Azure*, IBM Cloud Data Guard*, Baidu*, Alibaba Cloud* and Equinix*. Later this year, we will release a PCI-Express add-in card that will enable Intel SGX in multi-socket Intel Xeon Scalable servers. And Intel SGX will continue to be rolled out across our mainstream Xeon platforms in upcoming generations.

As part of today’s announcement of the new Confidential Computing Consortium, I am pleased to share that we are contributing the Intel SGX SDK to this new community to help simplify secure enclave development and deployment.

The launch of the Confidential Computing Consortium is a big step in bringing this powerful security capability to a broader audience, and we are committed to working with our ecosystem customers to ease use and portability of confidential computing for developers and IT pros. We invite developers to learn about how to integrate Intel SGX into their applications and cloud services today, and the future of the consortium at its website.

Lorie Wigle is vice president in the Architecture, Graphics and Software Group and general manager of Platform Security Product Management at Intel Corporation.

About Intel
Intel (NASDAQ: INTC), a leader in the semiconductor industry, is shaping the data-centric future with computing and communications technology that is the foundation of the world’s innovations. The company’s engineering expertise is helping address the world’s greatest challenges as well as helping secure, power and connect billions of devices and the infrastructure of the smart, connected world – from the cloud to the network to the edge and everything in between. Find more information about Intel at newsroom.intel.com and intel.com.

Filed Under: Tech Tagged With: Confidential Computing, Intel

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Adobe Introduces LLM Optimizer to Help Brands Navigate the Generative AI Shift
  • Why Visa and Mastercard Stocks Slipped After the Stablecoin News
  • iOS 26: The Most Personal, Intelligent, and Private iPhone Experience Yet
  • Postman Unveils Agentic AI Tooling to Operationalize API-Driven Intelligence
  • AM Batteries Opens New Facility in Billerica to Advance U.S. Battery Supply Chain
  • Meibel Secures $7 Million to Revolutionize AI Runtime Management
  • Tailor Raises $14 Million to Redefine ERP for Modern Businesses with Composable Architecture
  • Intel Unveils New GPUs and AI Accelerators at Computex 2025
  • Unlocking Critical Minerals: USGS Invites States to Turn Mine Waste into Treasure
  • Blacksmith Reimagines Continuous Integration with AI-Optimized Infrastructure

Media Partners

  • Market Analysis
  • Cybersecurity Market
China’s Strategic Shift to RISC-V: Market Implications and Growth Prospects
Understanding Transfer Pricing: A Key Component of Multinational Business Operations
A Comprehensive Tour of Project Management Tools and Integration Platforms
Implementing Odoo ERP in a Small Manufacturing Enterprise: Costs and Considerations
Economic Optimism Meets Uncertainty: Blue Chip Indicators Highlight Post-Election Fiscal Concerns and AI’s Looming Impact
The Future of Connectivity: Insights from Ericsson’s November 2024 Mobility Report
Platinum Market Faces Sustained Deficit Amidst Strong Demand and Constrained Supply
Breaking Beijing’s Grip: U.S. and Australia Unite Against China’s Rare Earth Monopoly
Global AI-Powered Accounting and Audit Services Market Analysis 2023-2030: Growth, Trends, and Forecast
The Re-Emergence of PHP
Passwork Achieves ISO/IEC 27001:2022 Certification, Reinforcing Commitment to Enterprise Security
Halo Security Honored with 2025 MSP Today Product of the Year Award
Cloudflare Log Explorer: A Unified Security and Performance Lens Within the Dashboard
The Rising Tide: AI and Cybersecurity Challenges Loom Large for CISOs
Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale
Cyera Raises $540M to Cement Its Role as AI’s Data Security Backbone
ZeroRISC Secures $10M to Build Transparent, Secure Supply Chains
Cisco Fuses AI Security Into the Network Fabric: A Unified Vision for the Agentic Era
Guardz Raises $56M Series B to Scale AI-Native Cybersecurity Platform for MSPs and SMBs
Horizon3.ai’s $100M Bet on Autonomous Security

Media Partners

  • Market Research Media
  • Technology Conferences
The Rise of Headless Content Frameworks in Distributed Media Projects
Developing Web Projects: From Concept to Launch
The Rise of APS-C Cameras: A Professional Renaissance in Photography
Market Brief: Disruption in Spanish Orange Supply Chain and Strategic Response by UK Retailers
Global AI-Powered Movie Scenario Market Analysis 2023-2030: Growth, Trends, and Forecast
Market Research Report: US Government Cybersecurity Market in 2024
Market Research Report: Global Advertising Revenue Projections and Trends in the Entertainment & Media Industry
Social Media: The Rise of Formulaic Content
Netflix’s Creative Decline: The Rise of Formulaic Content
The Transformation of Media: Navigating the Waning Allure of Social Platforms
Apple Announces WWDC25, June 9 to 13, 2025
Adobe Summit 2025, March 17-20, Las Vegas
Embedded World 2025, from 11 to 13 March 2025 in Nuremberg
SATELLITE 2025: Uniting the Global Satellite and Space Communities
The milestone 10th edition of Chatbot Summit on March 31 – April 1, 2025, The Ritz-Carlton, Berlin
Snowflake Summit 2025, scheduled for June 2-5, 2025, in San Francisco
The NVIDIA GPU Technology Conference (GTC) 2025 is set to take place from March 17 to 21 at the San Jose McEnery Convention Center in San Jose, California
The Taipei Nangang Exhibition Center is set to host COMPUTEX 2025 from May 20 to May 23
The Mobile World Congress (MWC 2025) will kick off from March 3 to 6 in Barcelona, Spain
IOT Solutions World Congress 2025: Forging the Future of Industrial Innovation

Copyright © 2022 Technologies.org

Media Partners: Market Analysis & Market Research and Exclusive Domains