You've requested...

Boosting trust in public cloud with Confidential Computing

If a new window did not open, click here to view this asset.

Download this next:

IBM vs. Oracle: Data security platforms

Data security has grown in importance over the entire data lifecycle, especially with Digital Personal Data Protection (DPDP) bill approved, the cost of failing to protect one’s data expands far beyond the effort companies put into recovering lost information.

The Leadership Compass report from KuppingerCole, provides an overview of the Data Security Platforms market, along with guidance and recommendations for finding the sensitive data protection and governance products that best meets clients’ requirement.

The report examines the broad range of technologies involved, vendor product and service functionality, relative market shares and more.

Read the data security report here.

These are also closely related to: "Boosting trust in public cloud with Confidential Computing"

  • Keys-in-the-Wild

    The rise of AI has lowered the barrier for attackers, expanding the threat landscape. Recent notable attacks and intrusions have highlighted cloud system vulnerabilities and the damage from exploited cryptographic keys.

    This white paper examines the "Keys-in-the-Wild" problem, where unprotected cryptographic keys are exploited by malicious actors. It outlines lessons from the intrusion through a Zero Trust lens, including the need for:

    • Continuous monitoring of key usage
    • Strict scope validation and access controls
    • Secure key storage and management

    Dig into the white paper to gain more insight.

  • How this AI-image recognition company improved profit with license management

    Alchera, a fast-growing  AI image recognition company, faced challenges in managing its software licensing as it scaled its industry-leading facial recognition technology.

    To overcome issues with licensing complexity, protection, and customer management, Alchera partnered with Thales to implement the Sentinel software monetization solution. This platform allowed Alchera to simplify license management, offer flexible licensing models, and secure its software, all while gaining valuable business insights.

    With Sentinel in place, Alchera can now focus on advancing its AI innovations for a safer world. Access the case study for the full story.

Find more content like what you just read:

  • Keys for leveraging an AI licensing platform for growth

    Korean AI medical device company AI Medic leveraged Thales' Sentinel platform to protect their IP, implement flexible subscription models, and streamline global expansion. Learn how Sentinel enabled AI Medic to confidently scale their life-saving coronary diagnostics software. Read the full case study.

    Download

  • How AI can help with early cancer detection: A healthcare case study

    Lunit, a Korean tech company, has harnessed the power of AI to detect early-stage cancers, enabling timely management and increased survival rates. Their innovative and affordable solutions are making waves in the medical world. Learn more about Lunit's transformative technology in this white paper.

    Download

  • Passwordless Authentication for Enterprises

    This Leadership Compass from KuppingerCole evaluates passwordless authentication solutions for enterprises, covering market analysis, vendor assessments, and key features. Download the report to learn how you can secure remote access and build user trust with passwordless authentication.

    Download

  • Leadership Compass Passwordless Authentication for Consumers: Securing Fast Business Online

    This Leadership Compass provides an in-depth overview of the passwordless authentication market, analyzing the leading vendors and their solutions. It covers key capabilities, delivery models, and market trends to help organizations select the best passwordless authentication solution for their needs. Read the full report to learn more.

    Download

  • Examining the Healthcare Industry's Potential for Confidential Computing

    Confidential computing will become key to protecting patient data as healthcare organizations seek to leverage cloud computing environments.

    Download

  • CW ASEAN: Defend against disruption

    In this month's issue of CW ASEAN, we take a closer look at how industrial control systems operators are improving the visibility of ICS environments without jeopardizing operations, addressing security vulnerabilities and enhancing cooperation between IT and operational technology teams. Read the issue now.

    Download

  • Analyst report: Security goals & decision-making tips

    Inside ARG’s “Cybersecurity Market Insights & Decision Guide,” you can discover three goals on which to focus in order to minimize the impact of a cybersecurity incident.

    Download

  • Computer Weekly – 28 May 2024: Digital border problems are stacking up

    In this week's Computer Weekly, we examine the government's post-Brexit plans for digital borders as problems begin to emerge. We find out about AI PCs and ask whether they will make any difference for enterprise IT. And we talk to Red Hat CEO Matt Hicks about the open source opportunities from AI. Read the issue now.

    Download

  • How to get the best value from Office 365

    In this e-guide, we outline the key differences between the three enterprise subscription packages offered by Office 365: E1, E3 and E5. By understanding the pros and cons of each tier as well as the needs of the end users, an IT department can ensure it purchases Office 365 in an effective manner.

    Download

  • Computer Weekly – 10 October 2023: Teeing up tech at the Ryder Cup

    In this week's Computer Weekly, we go behind the scenes at golf's Ryder Cup to see the tech firsts introduced to improve the fan experience. UK tech leaders explain why they feel 'betrayed' by the government's net-zero policy changes. Read the issue now.

    Download

  • Empowering enterprises with AI: Entering the era of choice

    This white paper explores how Dell and AMD are democratizing AI by making it more accessible to enterprises. It highlights how their solutions can enable real-time AI workflows, ensure data security, and scale cost-effectively. Read the full paper now to learn how you can leverage AI to transform your business.

    Download

  • Simplified ERP management with a unified multicloud platform

    Lithuanian Railways (LTG) standardized its IT infrastructure on Red Hat Enterprise Linux and Ansible Automation Platform to reduce complexity, enable automation, and support its new SAP S/4HANA ERP system. This helped LTG optimize system performance and free up IT staff to focus on innovation. Read the full case study to learn more.

    Download

  • How to secure multi-cloud estates

    How can organizations minimize compromised access in the cloud? This white paper covers identity security and the challenges and benefits of cloud compliance to reduce security risk. Read on to learn about best practices to secure identities in the cloud as well as three phases to achieve cloud identity security success.

    Download

  • Combat threats with an in-depth security stance that begins with Dell PowerEdge servers, powered by Intel® Xeon® Scalable processors.

    As data is accessed across devices, on-premises and in the cloud, high-impact data breaches continue to mount. To maintain a more secure environment, businesses must be more comprehensive in their approach. Access this white paper now to learn how.

    Download

  • Cloud Security 101: Best Practices & Self-Assessment

    In this eguide, review best security practices in the age of cloud, and read through two cloud security quizzes from industry experts.

    Download

  • Google Cloud virtual machine instances powered by AMD

    Google Cloud virtual machine instances powered by AMD are designed to provide competitive performance and a range of options to help customers optimize their workloads for cost-efficiency. Download this overview to unlock 5 Reasons Why AMD Epyc Processors matter for Google Cloud.

    Download

  • Simplify your journey to the cloud with Red Hat and Google Cloud

    Modern hybrid and multi-cloud IT infrastructures can help you meet the demands of digital business. To help you operate your environments more efficiently, Red Hat and Google Cloud have partnered up, providing you with all the tools and technologies you need. Access this white paper to learn more.

    Download

  • IT leader’s guide to third-party support: Benefits & more

    Your integrated technology is only as good as the support teams behind them. Unfortunately, for many IT leaders, most of today’s top solutions don’t have support teams that can keep up with new challenges and demands. So, how can businesses best fix this?

    Download

  • 10 steps to Microsoft 365 cyber resilience

    Protecting Microsoft 365 data is essential to any modern cybersecurity strategy, since the suite’s applications are so commonly used in businesses of all sizes and industries. Read this e-book for 10 steps you can take to build a more proactive approach to security.

    Download

  • Computer Weekly – 2 April 2019: The nightmare driving test – making driverless cars safe

    In this week's Computer Weekly, we talk to AI experts about the challenges of teaching autonomous vehicles how to drive safely in often extreme environments. Our latest buyer's guide looks at business intelligence and analytics. And we examine the implications of the EU's controversial new copyright laws. Read the issue now.

    Download

  • 8 Benefits of a Backup Service for Microsoft 365

    Read this e‑book, “8 Benefits of a Backup Service for Microsoft 365”, to understand what makes cloud‑based backup services so appealing for companies using Microsoft 365 — and why it may be just the thing to keep your business running.

    Download

  • Computer Weekly – 28 June 2022: Why collaboration – not competition – is the key to IT sustainability

    In this week's Computer Weekly, as sustainability rises up the corporate agenda, IT leaders say more collaboration is needed to meet climate goals. Microsoft faces further calls for greater transparency over software tools used to monitor employees. And the cyber security industry warns over an increasing loss of talent. Read the issue now.

    Download

  • Innovation Awards APAC 2023 - Healthcare: Zuellig Pharma

    Zuellig Pharma saw the lack of advanced analytics and trusted data platforms in the healthcare sector and built an offering to plug the gaps and help pharmaceutical companies enhance customer engagement. The platform has already helped one organisation better understand user behaviour and gain customer loyalty.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • Understanding FedRAMP cloud security requirements and options

    SRM leaders must fully understand the FedRAMP program, its security levels, and the authorization process to make informed cloud security decisions. Verify CSP FedRAMP status and ask probing questions. Remember that using a FedRAMP-authorized cloud does not absolve security responsibilities. Read the full Gartner Research Report to learn more.

    Download

  • IT investments: 1,500 organizations’ obstacles & experiences

    To understand the top obstacles to maximizing the value of your organization’s IT investments, review this 19-page report, which is informed by the survey results of 1,500 ARG clients.

    Download

  • 2024 Ransomware Trends United States Executive Summary

    This year’s report surveyed 400 CISOs, security professionals, and backup administrators whose organizations suffered at least one ransomware attack. Download this report to learn about the targets and impacts of ransomware attacks, the financial impact, cyber insurance, and the cost of team misalignment.

    Download

  • 2024 Ransomware Trends North America Executive Summary

    This year’s report surveyed 350 CISOs , security professionals, and backup administrators whose organizations suffered at least one ransomware attack in 2023. Download this report to learn about the targets and impacts of ransomware attacks, the financial impact, cyber insurance, and the cost of team misalignment.

    Download

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

    Download

  • Research Findings: SMEs and Incident Readiness Services

    To understand why mid-market organizations and SMEs purchase incident readiness and response services, The Richmond Advisory Group surveyed 500 cybersecurity decision-makers. Review the survey’s findings in this 2024 report, “Why Mid-market Organizations Are Prioritizing Incident Readiness and Response in the Face of Regulatory Scrutiny.”

    Download

  • How to plan your next cloud project based on current cloud results

    For cloud and IT projects to hit their targets for efficiency, productivity, and even cost controls, IT leaders should evaluate the assumptions that underlie their project planning. Learn 4 questions to ask yourself before starting your next cloud project in this white paper from Red Hat.

    Download

  • TechTarget's Cheat Sheet for Over 100 Cloud Services from AWS and Other Providers

    Navigating AWS and other providers' services can be daunting, with each platform offering hundreds of uniquely named options. Our Cloud Services Cheat Sheet simplifies this, giving you a quick reference to identify and compare similar services across providers.

    Download

  • Master hybrid cloud backup costs, security and management e-book

    Unlock cost-effective hybrid cloud backup strategies. Learn to secure data and improve efficiency with expert tips in this e-book.

    Download

  • Computer Weekly - 23 March 2021: Would the UK really nuke a cyber attacker?

    In this week's Computer Weekly, did the UK's defence and security review really suggest a nuclear response to a cyber attack? Data visualisation has been widely used to explain the Covid-19 pandemic, but not always that effectively. And jewellery retailer Pandora explains how it kept the personal touch as customers went online. Read the issue now.

    Download

  • MicroScope – December 2023: What does the future hold for Industry 5.0?

    In this issue, we explore the future of Industry 5.0 to discover whether it's truly a tech revolution or just the next step in what has been promised since Industry 4.0. Also learn more about the risks and impacts of generative AI on data compliance and compliance, as well as seven steps you should take to engage customers while providing services

    Download

  • Demystifying the myths of public cloud computing

    In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.

    Download

  • Building a Cyber-Resilient Data Recovery Strategy

    Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk. Read this new white paper and learn how.

    Download

  • Computer Weekly - 26 April 2022: The latest salary trends for IT professionals

    In this week's Computer Weekly, the results of our annual salary survey show pay returning to pre-pandemic levels and work-life balance a growing consideration. As sustainability becomes a critical issue, we look at how datacentres can meet emissions targets. And we find out how IT leaders can help protect children online. Read the issue now.

    Download

  • Procurement transformation in the age of generative AI

    As procurement evolves from traditional, back-office functions to more strategic lines of business, so are the technologies that organizations are adopting. But with so many solutions available, how can you know which is best for you? Browse this report to learn more.

    Download

  • Gen AI 101: Procurement leader’s guide

    Gen AI is transforming the way that industries look at creativity and automation. For procurement operations, some have started to consider adopting AI and ML- based cognitive solutions in order to enhance efficiency and productivity. However, many are hesitant to embrace these tools. Dig into this white paper to learn more.

    Download

  • The Power Of Proactive Cybersecurity Using Ethical Hackers To Uncover – And Fix Security Gaps

    A global tech company hired VikingCloud's Cyber Threat Unit to scan its systems and find vulnerabilities before a cyberattack. The assessment revealed security misconfigurations that could enable data breaches and ransomware. Read the full case study to learn how the company improved its cybersecurity.

    Download

  • Cutting the cord to leverage third-party support

    As companies look to leverage third-party support providers for solutions like Oracle, agreeing that they can help restore higher quality service (including reducing the cost of maintenance fees by at least 50%), many can be unsure of what provider is best fit for them. Access this white paper to learn more.

    Download

  • Data Fabric For Dummies

    In this digital edition of the popular For Dummies series of reference books, step into the world of data fabrics: inside, learn what a data fabric is and how to realize its benefits, how to effectively build and deploy a data fabric, best practices for optimizing and modernizing data access, and more.

    Download

  • Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security

    In this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.

    Download

  • The Importance of Securing Workloads for Generative AI

    Securing Generative AI workloads is crucial to protect sensitive data, intellectual property, and brand reputation. AWS offers solutions like Nitro System, Key Management Service, and PrivateLink to build a comprehensive security posture. Read the full ESG Showcase report to learn more.

    Download

  • 8 ways Linux supports modern IT and business goals

    In this e-book, discover an extensive overview of why the operating system—and specifically the Linux operating system—still matters today and how it meets modern IT and business demands.

    Download

  • Secure GenAI Workloads to Unlock Transformative Potential

    Securing generative AI (GenAI) workloads is crucial to protect sensitive data, maintain intellectual property, and build customer trust. This report explores how AWS solutions can help organizations build a comprehensive security model for their GenAI initiatives. Read the full Enterprise Strategy Group Showcase.

    Download