SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Cohesity brings Intel’s Confidential Computing Capabilities to Cohesity Data Cloud

10 Apr 2024

Cohesity brings Intel’s Confidential Computing Capabilities to Cohesity Data Cloud
Contact company
Contact Cohesity
icon Add as a preferred source Download PDF version

Cohesity, a pioneer in AI-powered data security and management, announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s cyber vault service, this data-in-use encryption innovation will be the first of its kind in the data management industry.

Together, Cohesity and Intel are solving one of the most pressing cybersecurity challenges for CIOs. Traditionally, options have been limited for protecting data in use while it is actively processed in memory, which can leave data unencrypted and vulnerable to insider attacks. Confidential computing enabled by Intel® Software Guard Extensions (Intel® SGX) will support Cohesity customers to reduce the risk posed by potential bad actors accessing data while it is being processed in main memory. This is especially critical for highly regulated industries like financial institutions, healthcare, and government.

Cohesity Data Cloud

Cohesity’s flagship platform, Cohesity Data Cloud, has long included many proven and cutting-edge technologies to help the world’s largest organisations manage and secure their most critical data from cyber criminals. Cohesity and Intel are joining forces to reduce customers’ risk of cyber threat by: 

  • Creating a unique solution that will protect encryption keys that secure customer data in a hardware-secured environment leveraging Intel SGX for confidential computing in the cloud.
  • This solution dramatically reduces the risk posed by data exfiltration, as the data is not viewable or downloadable by any privileged accounts when the data is being processed in memory as it is encrypted. 
  • Providing a way for Cohesity customers to verify that their Intel SGX is legitimate by using Intel® Trust Authority, which has the latest patches and only runs the dedicated Cohesity application before extracting the data encryption key. 

Intel SGX

“We are relentlessly focused on innovation that furthers our mission: To protect, secure, and provide insights into the world’s data. Collaborations with the biggest and most trusted names in tech, like Intel, are the reason why the largest global enterprises rely on us to strengthen their business resilience,” said Sanjay Poonen, CEO and President of Cohesity. “With Intel SGX, Intel Trust Authority, and confidential computing, our customers will benefit from reduced risk and increased security in cloud environments, allowing them to focus on what really matters, their business.”

“Intel is a pioneer and leader in data centre confidential computing technologies, enabling customers, especially those handling sensitive or highly regulated data, to address their needs of confidentiality, integrity, and attestation for their workloads,” said Greg Lavender, executive vice president and chief technology officer at Intel Corporation. “Cohesity’s adoption of our technology reflects the growing customer need to protect critical data in the cloud and advances our common goal of delivering a secure computing environment combined with the trust customers expect.”

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office security
  • Application security
  • Healthcare security
  • Building security
  • Cyber security
  • Corporate Security
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • Related links
  • ANPR Software CCTV software
  • Access Control Software Access control software
  • Networkable Access control readers
  • Bar Code Access control readers
  • Contact Access control software
  • Drawing Software CCTV software
  • Central Monitoring Option Access control software
  • Mifare Access control readers
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • RFID Access control readers
  • Keypad Commands/Intrusion Zones Access control software
  • Management Systems Upgrade Access control software
  • Visitor Management tool Access control software
  • Related categories
  • CCTV software
  • Access control software
  • Access control readers
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Corporate news
About this page

"See how Cohesity and Intel are transforming cybersecurity, introducing first-of-its-kind data-in-use encryption to the Cohesity Data Cloud. Protecting active memory data against insider threats becomes easier and more secure."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec