The Challenge
Data in use refers to the data in the computing environment that is accessed, processed, and modified in real-time. For example, analyzing banking transaction logs, typing credentials, submitting financial or medical information to web portals, etc. This data in use state is exposed to security risks, unauthorized access, and tampering at runtime.
Fortanix Solution
Fortanix is an inaugural member of the Confidential Computing Consortium, alongside companies like Google, Intel, and Microsoft. Fortanix’s Confidential Computing Manager (CCM) protects data in use with a trusted execution environment (TEE), or secure enclave, which runs data completely encrypted in memory, isolated from the infrastructure. This way, data remains protected even if the infrastructure is compromised, reducing the risk of data leaks.
Fortanix CCM simplifies the workflows for enclave lifecycle management, including creation, deployment, monitoring, and auditing across multiple public clouds and on-premises environments. Confidential computing revolutionizes how customers protect their sensitive data and orchestrate critical security policies such as identity verification, data access control, and code attestation.
Benefits
Centralized Management across Hybrid and Multicloud
Organizations can easily manage the confidential computing environments for their most sensitive apps using a single pane of glass, no matter if the app runs on-premises, or in the cloud.
Fast to Production
Fortanix enables existing applications to run in a confidential computing environment without the need for additional app and integration development efforts.
Meet Compliance with Enforced Policy and Auditing
Organizations can meet strict compliance requirements by managing and enforcing security policies, including identity verification, data access control, and attestation, to ensure the integrity and confidentiality of data, code, and applications. They can use these policies to implement geo-fencing and compute affinity to support data regulation policies such as GDPR. Fortanix also provides audit logs to verify compliance requirements.