Confidential Computing – The Next Frontier in Data Security
Thematic Report

20 Dec 2021
by Ronak Doshi, Abhishek Mundra, Arjun Singh Chauhan, Suseel Menon

Ever-growing information volumes and analyses have started posing significant challenges to preserving data privacy and security. Existing methods of data protection cover only data at rest or in transit. Data in the computation or processing phases often remains vulnerable to security risks. Confidential computing is a relatively novel method to protect data in use through the use of Trusted Execution Environments (TEEs) at the hardware level to ensure comprehensive security model. This report explores the market opportunity for confidential computing across key market segments.

Scope

  • All industries and geographies
  • In this research, Everest Group analyzes the market opportunity for confidential computing using proprietary datasets, consultations with market stakeholders, and inputs from members of the Confidential Computing Consortium, a project community at the Linux Foundation

Contents

In this research, we study the following topics:

  • Total Addressable Market (TAM) opportunity and growth for confidential computing
  • Segmentation of TAM across hardware, software, and services segments
  • Distribution of market opportunity by industry and geography
  • TAM scenario analysis
  • Factors driving the spend on confidential computing
  • Key use cases driving the technology’s adoption
  • Implications for key market players

Membership(s)

Digital Services

Cloud and Infrastructure Services

Sourcing and Vendor Management

 

Page Count: 41