Ever-growing information volumes and analyses have started posing significant challenges to preserving data privacy and security. Existing methods of data protection cover only data at rest or in transit. Data in the computation or processing phases often remains vulnerable to security risks. Confidential computing is a relatively novel method to protect data in use through the use of Trusted Execution Environments (TEEs) at the hardware level to ensure comprehensive security model. This report explores the market opportunity for confidential computing across key market segments.
Scope
All industries and geographies
In this research, Everest Group analyzes the market opportunity for confidential computing using proprietary datasets, consultations with market stakeholders, and inputs from members of the Confidential Computing Consortium, a project community at the Linux Foundation
Contents
In this research, we study the following topics:
Total Addressable Market (TAM) opportunity and growth for confidential computing
Segmentation of TAM across hardware, software, and services segments
Distribution of market opportunity by industry and geography
TAM scenario analysis
Factors driving the spend on confidential computing
While COVID-19 temporarily impacted the overall services industry, it considerably pushed the needle for digital transformation. The pandemic accelerated enterprises’ focus on cloud, data, analytics, and AI investments to ensure business continuity…