target audience: TECH SUPPLIER  Publication date: Aug 2024 - Document type: IDC Survey Spotlight - Doc  Document number: # US52508524

Confidential Computing Use Is Growing, Driven by Its Enhanced Hardware-Based Security Features

By:  Chris Drake Loading

Content

  • 2 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Abstract


This IDC Survey Spotlight explores the way in which end-user organizations are already using confidential computing or considering its future use. It includes data from IDC's 2024 Enterprise Infrastructure Pulse Survey. Survey respondents include global users of confidential computing, who were asked to identify the two most relevant factors that led their organization to adopt confidential computing, as well as the use cases their organization is addressing, or trying to address, with confidential computing.

According to Chris Drake, senior research director, Compute Infrastructure and Service Provider Trends at IDC, "45% of organizations already use confidential computing with a further 17% currently testing, evaluating, and experimenting with the technology." He continues that "leading adoption drivers of confidential computing include its ability to ensure secure/trusted platforms, as well as enhance real-time data encryption and container-based application security, while major use cases include enhancing customer data privacy, providing industry-specific IP protection, and ensuring secure multiparty computation."



Coverage


Do you have questions about this document
or available subscriptions?