<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1448210&amp;fmt=gif">

Privacy-Enhancing & Secure Computing Technologies

Price: Starting at USD 3,000
Publish Date: 15 Aug 2023
Code: PT-2289
Research Type: Presentation
Pages: 42
Actionable Benefits

Actionable Benefits

  • Understand commercial developments of different security technologies being leveraged for privacy and confidentiality
  • Determine a realistic timeline for maturity of various Privacy Enhancing Technologies (PETs) and Confidential Computing (CC).
  • Identify target markets and business models for delivery of PET and CC.
Research Highlights

Research Highlights

  • High-level view of PET and CC solutions currently available on the market.
  • PET and CC vendor ecosystem snapshot.
  • Total Addressable Market (TAM) for various PET and CC technologies.
Critical Questions Answered

Critical Questions Answered

  • What types of security technologies are being leveraged for confidentiality and privacy?
  • Which vendors are offering PET and CC services and how are they delivering them?
  • What is the market opportunity for PET and CC?
Who Should Read This?

Who Should Read This?

  • Artificial Intelligence (AI)/Machine Learning (ML) developers to understand how to implement privacy and confidentiality.
  • Silicon Intellectual Property (IP) and semiconductor manufacturers to develop appropriate underlying secure hardware.
  • PET and CC vendors to forge partnerships for integration and interoperability.
  • Regulators and standards development organizations in order to assess technology specification maturity.

Companies Mentioned

Alibaba Group
AMD
ARM Ltd.
ATOS
AWS
Digicert
Entrust
Futurex
GlobalSign
Google
HID Global
Huawei
IBM Corp
Infineon
Intel Corporation
Marvell
Microsoft Corporation
NVIDIA
Oracle Corporation
Qualcomm Inc
Samsung
Securosys
STMicroelectronics
Thales
UTIMACO
VMware, Inc.

Table of Contents

Introduction

Technology Overview

Multi-Party Computation

Homomorphic Encryption

Differential Privacy

Zero-Knowledge Proof

Synthetic Data

Federated Learning

Trusted Execution Environment

Confidential Computing

Trusted Platform Module

Hardware Security Module

Encryption Key Management & Public Key Infrastructure

Distributed Ledger Technology

Analysis

Summary

 

Companies Mentioned

  • Alibaba Group
  • AMD
  • ARM Ltd.
  • ATOS
  • AWS
  • Digicert
  • Entrust
  • Futurex
  • GlobalSign
  • Google
  • HID Global
  • Huawei
  • IBM Corp
  • Infineon
  • Intel Corporation
  • Marvell
  • Microsoft Corporation
  • NVIDIA
  • Oracle Corporation
  • Qualcomm Inc
  • Samsung
  • Securosys
  • STMicroelectronics
  • Thales
  • UTIMACO
  • VMware, Inc.