Confidential Computing protects data in use by performing the computation in
a hardware-based Trusted Execution Environment. These secure and
isolated environments prevent unauthorized access or modification of
applications and data while they are in use, thereby increasing the
the security level of organizations that manage sensitive and regulated
data.
In this lightboard video, Alex Greer with IBM Cloud, visually breaks
down how Confidential Computing works, as well as walks through a few
key uses cases that demonstrate how Confidential Computing can help
assure your data is protected and confidential.