If playback doesn't begin shortly, try restarting your device.
•
You're signed out
Videos you watch may be added to the TV's watch history and influence TV recommendations. To avoid this, cancel and sign in to YouTube on your computer.
CancelConfirm
Share
An error occurred while retrieving sharing information. Please try again later.
ACC is a solution space for sensitive data workloads, including infrastructure platform, services, tools, and partner ecosystem to aid companies with defense in depth to ensure their data is kept private from unauthorized access.
Find more upcoming episodes at https://aka.ms/ateonlearntv
Chapters:
0:00- Introductions
0:45- What was announced at Microsoft Build about Azure Confidential Computing?
2:50- What is Azure Confidential Computing?
7:00- Do you think Secure Enclaves could meet FIPS 140-2 Level 2 compliance?
8:00- Can you talk more about application enclaves?
10:00- What ISV and Partner solutions exist?
14:00- Is there a certification I should pursue for ACC?
17:20- What is happening in the container space beyond VMs?
19:38- Can you talk more about 'bring your own key' scenarios?
23:15- What are the processing requirements in this encrypted environment?
27:00- Closing notes…...more
Ask the Expert: Data Privacy with Azure Confidential Computing
ACC is a solution space for sensitive data workloads, including infrastructure platform, services, tools, and partner ecosystem to aid companies with defense in depth to ensure their data is kept private from unauthorized access.
Find more upcoming episodes at https://aka.ms/ateonlearntv
Chapters:
0:00- Introductions
0:45- What was announced at Microsoft Build about Azure Confidential Computing?
2:50- What is Azure Confidential Computing?
7:00- Do you think Secure Enclaves could meet FIPS 140-2 Level 2 compliance?
8:00- Can you talk more about application enclaves?
10:00- What ISV and Partner solutions exist?
14:00- Is there a certification I should pursue for ACC?
17:20- What is happening in the container space beyond VMs?
19:38- Can you talk more about 'bring your own key' scenarios?
23:15- What are the processing requirements in this encrypted environment?
27:00- Closing notes…...more