Middle East organisations eye confidential computing for cloud security

Middle East governments are dipping their toes into confidential computing as a way of ensuring compliance with data regulations and information security in cloud settings. Here's a look at what it is and how it can help your business.

diversity saudi arabia saudi man gesturing to be quiet secret uae middle east by aaronamat gettyima
aaronamat / Getty Images

As more organisations across the Middle East move onto public and hybrid cloud services while struggling to comply with data privacy regulations, information security becomes even more important. A security technique called confidential computing can help.

Traditionally, businesses have relied on cloud providers not to access their sensitive data, which is known as operational assurance. However, confidential computing is designed to ensure that data is secured at the hardware level so that providers are simply incapable of accessing data. This is known as technical assurance.

Various providers currently offer confidential computing technology in the region including, but not limited to, IBM, Microsoft, Intel and Fortanix — all members of the Confidential Computing Consortium (CCC), a Linux Foundation community project. Their offerings add a new layer to data security, potentially removing the remaining barrier to cloud computing for highly regulated businesses in the Middle East.

What is confidential computing?

Confidential computing is a security architecture designed to protect data when it is being processed in memory, by using hardware-based techniques complemented by software SDKs that allow developers to protect select code and even entire applications.

To continue reading this article register now

Discover what your peers are reading. Sign up for our FREE email newsletters today!