Fortanix Listed as a Sample Vendor for Confidential Computing in Multiple Recent Gartner Hype Cycle Reports

Included in Six Gartner Hype Cycle Reports in All, Company Also Listed as Sample Vendor for Hardware-Based Security and Key Management as a Service.
MOUNTAIN VIEW, California, September 18, 2019

Fortanix® Inc., the Runtime Encryption® company, today announced it was mentioned as a Sample Vendor for Confidential Computing in three recent Gartner Hype Cycle reports: Hype Cycle for Cloud Security, 2019 [1] ; Hype Cycle for Compute Infrastructure, 2019 [2]; and Hype Cycle for Privacy, 2019 [3].

In total, Gartner identified Fortanix as a Sample Vendor in six recent Hype Cycle reports. These included:

  • Hype Cycle for Cloud Security, 2019 – for Confidential Computing, Hardware-Based Security and KMaaS

  • Hype Cycle for Compute Infrastructure, 2019 – for Confidential Computing and Hardware-Based Security

  • Hype Cycle for Privacy, 2019 – for Confidential Computing

  • Hype Cycle for Infrastructure Strategies, 2019 [4]– for Hardware-Based Security

  • Hype Cycle for Data Security, 2019  [5]– for KMaaS

  • Hype Cycle for Threat-Facing Technologies, 2019 [6]– for Hardware-Based Security

According to the Gartner Hype Cycle for Cloud Security, 2019, “Confidential computing potentially removes the remaining barrier to cloud adoption for highly regulated businesses or any organization concerned about unauthorized third party access to data in use in the public cloud. It’s likely that auditors and regulators will demand increased protection of certain data types, including high barriers to provider and government access. Confidential computing enclaves provide such protection now.”

According to the Gartner Hype Cycle for Compute Infrastructure, 2019, “As workloads become increasingly mobile, virtualized and cloud-based, software-based security controls are embedded in the workload they are protecting. However, if the workload is compromised, the security controls may be disabled or compromised. Hardware-based security control isolation approaches strongly isolate the workload and its security controls from a breach of the application or OS. Interest in strong isolation techniques has risen in the face of the newly discovered side channel attacks, named Spectre and Meltdown and their subsequent variants and the desire to use IaaS providers in potentially hostile parts of the world.”

“We believe being recognized by Gartner as a Sample Vendor in these six reports validates the need for hardware-based Runtime Encryption® and secure enclaves for Confidential Computing,” said Ambuj Kumar, Co-Founder and CEO of Fortanix. “Organizations using Fortanix’s cloud security solutions benefit from our unique ability to deliver Confidential Computing over the past three years leveraging Runtime Encryption® platform with Intel® Secure Guard Extensions Intel® SGX secure enclaves for complete data-in-use protection.”

Fortanix Confidential Computing powered by Intel® SGX secure enclaves allows for a variety of enterprise use cases, including securing data-centric workloads such as blockchain, databases, AI/machine learning and anonymous multi-party analytics. Secure enclaves provide increased confidentiality, integrity, and protection for the data and applications running within them, even if the infrastructure is compromised.

Fortanix is solving today’s cloud security and data privacy problem. By decoupling security from the infrastructure, Fortanix removes complex and intractable security challenges experienced with current solutions. Running applications in protected enclaves enables a new level of deterministic security on premise, in hybrid environments, and even on remote clouds, protecting data even when systems are compromised.

Note 1 – Gartner, Inc. “Hype Cycle for Cloud Security, 2019” by Jay Heiser, Steve Riley. July 23, 2019.

Note 2 – Gartner, Inc. “Hype Cycle for Compute Infrastructure, 2019” by Daniel Bowers, Martin Reynolds, Chirag Dekate, Tony Harvey. July 26, 2019.

Note 3 – Gartner, Inc. “Hype Cycle for Privacy, 2019” by Bart Willensen. July 11, 2019.

Note 4 – Gartner, Inc. “Hype Cycle for Infrastructure Strategies, 2019” by Philip Dawson, Nathan Hill. July 31, 2019.

Note 5 – Gartner, Inc. “Hype Cycle for Data Security, 2019” by Brian Lowans. July 30, 2019.

Note 6 – Gartner, Inc. “Hype Cycle for Threat-Facing Technologies, 2019” by Pete Shoard. July 12, 2019.

Gartner Disclaimer

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Fortanix

Fortanix’s mission is to solve cloud security and privacy challenges. Fortanix allows customers to securely operate even the most sensitive applications without having to trust the cloud. Fortanix provides unique deterministic security by encrypting applications and data everywhere – at rest, in motion, and in use with its Runtime Encryption® technology built upon Intel® SGX. Fortanix secures F100 customers worldwide and powers IBM Data Shield and Equinix SmartKey™ HSM-as-a-service. Fortanix is a venture backed Gartner Cool Vendor headquartered in Mountain View, Calif.

Fortanix and Runtime Encryption are registered trademarks of Fortanix, Inc. Fortanix Data Security Manager is a trademark of Fortanix, Inc. All other marks and names mentioned herein may be trademarks of their respective companies.
FIPS 140-1 and FIPS 140-2 TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments

Share this post: