Logo

    confidentialcomputing

    Explore " confidentialcomputing" with insightful episodes like "#177 Zero Trust Data with SafeLiShare" and "Confidential Computing with Graham Bury, Eden Cohen, and Anna Montalat Campamar" from podcasts like ""Embracing Digital Transformation" and "Azure for Executives"" and more!

    Episodes (2)

    #177 Zero Trust Data with SafeLiShare

    #177 Zero Trust Data with SafeLiShare

    During this episode, Darren and SafeLishare CEO Shamim Naqvi discuss how confidential computing can be employed to create managed data-sharing collaborative environments in the cloud.

     The SafelyShare Revolution in Data Sharing and Confidentiality 


    Data sharing has always been a key issue when dealing with sensitive and confidential business information. The advanced technological solutions including SafelyShare have been tackling this problem, offering a controlled system for data access without violating data protection. The fundamental basis of this system is "Zero Trust", a unique strategy that doesn't assume trust for anyone and keeps control and monitoring at its core. 


     Harnessing the Power of Secure Enclaves


    A critical aspect of SafelyShare's approach is the use of secure enclaves, or trusted execution environments, ensuring a safe space for data sharing, authentication, and management. These enclaves are created with the help of specific confidential computing chipsets that fully enclose the shared data. With encryption practices implemented outside of these enclaves, data can only be decrypted once it enters the enclave, thereby providing an end-to-end encryption policy. The output exiting the enclave is also encrypted, adding another layer of security to protect the data.


    But challenges exist within this process. Not all online services incorporate a secure enclave in their operation, leading to a high demand for a more flexible, effective solution to confidential computing.


     The Hybrid Approach of Confidential Computing


    To address this issue, SafelyShare offers an approach that is best described as a hybrid model of confidential computing. To compensate for services that don't operate within secure enclaves, this methodology introduces the idea of 'witness execution.' In this scenario, the user places trust in the providers' guarantee of their competency and safe data handling. It's a kind of tacit agreement between the user and the remote service provider, making the confidential computing more feasible in the real world scenarios.


    This hybrid approach redefines the secure sharing paradigm in a world that's continuously evolving. With its elastic foundation, SafelyShare incorporates a profound understanding of the changing security parameters, making confidential computing adaptable and responsive to changing demands and realities.


     Conclusion: Revolutionizing Secure Data Sharing


    In essence, SafelyShare is the leading forerunner in the journey to making sensitive data sharing secure, efficient, and feasible. Navigating around traditional hurdles, it integrates hybrid confidential computing into its framework, achieving a unique blend of trust and practicality. The innovative approach of integrating witnessed computing into the process blurs the lines between full and partial trust, making data security more achievable and delivering a promising narrative for the future of data sharing and security.

    Confidential Computing with Graham Bury, Eden Cohen, and Anna Montalat Campamar

    Confidential Computing with Graham Bury, Eden Cohen, and Anna Montalat Campamar

    Microsoft believes security and information privacy are fundamental rights. And Microsoft has taken this to heart with a Confidential Computing initiative as part of the overall Azure promise on trust and security.

    In this episode, Graham Bury, Eden Cohen, and Anna Montalat Campamar talk about what Confidential Computing is, what is Microsoft’s vision for Confidential Computing in the Azure space is, pros and cons to computing confidentially on the cloud rather than a private data center, and a few stories about how partners and customers are working with Microsoft to move forward their own Confidential Computing initiatives.

    Episode Links:

    Customer stories:

    Guests:

    Graham Bury joined Azure’s Compute organization two years ago to lead the commercialization and developer platform for confidential computing.  He brings over 15 years of experience at Microsoft across client and service products from Windows to Surface Hub and HoloLens.

    Follow him on LinkedIn or Twitter.

    Eden Cohen joined Azure's Compute organization earlier this year and leads the infrastructure product team within Confidential Computing. He is responsible for virtual machine and hardware-based products. 

    Follow him on LinkedIn.

    Anna Montalat Campamar leads the product marketing efforts for Azure Security platform and Confidential Computing. She has experience in a wide array of technologies – from infancy such as quantum to growing ones, including confidential computing.

    Follow her on LinkedIn or Twitter

    Host:

    David Starr is a Principal Software Engineer in the Commercial Marketplace Services team at Microsoft.

    Follow him on LinkedIn and Twitter.