Microsoft Azure DCsv2-Series, based on Intel® Software Guard Extensions (Intel® SGX) and with a hardware-based trusted execution environment (TEE), is now available. Relying on the reliable foundation provided by Intel, Azure DCsv2-Series enables confidential computing to reach a wide range of enterprise customers, helping them to effectively protect sensitive workloads while making full use of cloud computing.
“Customers need to encrypt data in use to reduce the attack surface while also strengthening protection of sensitive data in the cloud,” said Anil Rao, vice president of Data Center Security and System Architecture at Intel. “Intel and Microsoft’s collaboration brings enterprise-grade confidential computing solutions to the market, allowing customers to take advantage of the cloud and multi-party computing paradigms with Intel® Software Guard Extensions.”
Combined with encrypted data storage and transmission methods, TEE can create an end-to-end protection architecture for sensitive data, such as important data in the financial services and healthcare fields. Microsoft Azure is the first cloud provider to use hardware-optimized TEE as an encryption mechanism to help customers protect data in use and provide a wide range of virtualization services. This move can strengthen security and privacy controls while supporting cloud data processing. Relying on Intel® Software Guard Extensions, Azure confidential computing virtual machines are independent of the operating system, hypervisor or virtual machine manager, and other privileged processes.
Today, Intel® Software Guard Extensions are available for Intel® Xeon® processor E-2100 series, and efforts are underway to extend them to subsequent generations of mainstream Xeon platforms. As Intel announced in February, the company is continuing to expand Intel® Software Guard Extensions technology to expand the scope of protection, extend protection to accelerators, and optimize performance. The number of use cases that can take advantage of these advanced application isolation capabilities will further increase.
Intel and Microsoft will work together to support customers in performing data processing in a more secure and private cloud environment in the future. Both companies are founding members of the Confidential Computing Consortium and are committed to providing a more secure computing infrastructure for today and tomorrow through industry collaboration.
Previous article:NXP to Supply Murata Manufacturing with RF Front-End ICs for Wi-Fi 6 Modules
Next article:Project Astra provides a powerful enterprise-grade storage and data services platform for Kubernetes
Recommended ReadingLatest update time:2024-11-15 16:16
- Popular Resources
- Popular amplifiers
- Microcomputer Principles and Interface Technology 3rd Edition (Zhou Mingde, Zhang Xiaoxia, Lan Fangpeng)
- Microcomputer Principles and Interface Technology Examples and Exercises (Kong Qingyun, Qin Xiaohong)
- Design and application of autonomous driving system (Yu Guizhen, Zhou Bin, Wang Yang, Zhou Yiwei)
- EDA Technology Practical Tutorial--Verilog HDL Edition (Sixth Edition) (Pan Song, Huang Jiye)
- e-Network Community and NXP launch Smart Space Building Automation Challenge
- The Internet of Things helps electric vehicle charging facilities move into the future
- Nordic Semiconductor Launches nRF54L15, nRF54L10 and nRF54L05 Next Generation Wireless SoCs
- Face detection based on camera capture video in OPENCV - Mir NXP i.MX93 development board
- The UK tests drones equipped with nervous systems: no need to frequently land for inspection
- The power of ultra-wideband: reshaping the automotive, mobile and industrial IoT experience
- STMicroelectronics launches highly adaptable and easy-to-connect dual-radio IoT module for metering and asset tracking applications
- This year, the number of IoT connections in my country is expected to exceed 3 billion
- Infineon Technologies SECORA™ Pay Bio Enhances Convenience and Trust in Contactless Biometric Payments
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Download from the Internet--ARM Getting Started Notes
- Learn ARM development(22)
- Learn ARM development(21)
- Learn ARM development(20)
- Learn ARM development(19)
- Learn ARM development(14)
- Learn ARM development(15)
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- EEWORLD University Hall----MIT Open Course: Circuits and Electronics
- Please analyze the circuit at the output end of the power supply.
- What are forward and flyback power supplies? What are the differences between forward and flyback? How to quickly distinguish them?
- Brief Introduction of Push-Pull Circuit
- CPU card program terminal sends data to ESAM
- Why do wireless modules need shielding covers?
- Loto practical tips (7) FFT spectrum analysis using an oscilloscope
- SHT31 Review + Unboxing Test
- Clock system of MSP430 microcontroller
- MicroPython hands-on——by eagler8