Privacy-Enhancing & Secure Computing Technologies

Price: Starting at USD 3,000
Publish Date: 16 Aug 2023
Code: PT-2289
Research Type: Presentation
Pages: 42
Privacy-Enhancing & Secure Computing Technologies
RELATED SERVICE AND SPOTLIGHTS: Cybersecurity Applications Hardware Security Modules
Actionable Benefits

Actionable Benefits

  • Understand commercial developments of different security technologies being leveraged for privacy and confidentiality
  • Determine a realistic timeline for maturity of various Privacy Enhancing Technologies (PETs) and Confidential Computing (CC).
  • Identify target markets and business models for delivery of PET and CC.
Critical Questions Answered

Critical Questions Answered

  • What types of security technologies are being leveraged for confidentiality and privacy?
  • Which vendors are offering PET and CC services and how are they delivering them?
  • What is the market opportunity for PET and CC?
Research Highlights

Research Highlights

  • High-level view of PET and CC solutions currently available on the market.
  • PET and CC vendor ecosystem snapshot.
  • Total Addressable Market (TAM) for various PET and CC technologies.
Who Should Read This?

Who Should Read This?

  • Artificial Intelligence (AI)/Machine Learning (ML) developers to understand how to implement privacy and confidentiality.
  • Silicon Intellectual Property (IP) and semiconductor manufacturers to develop appropriate underlying secure hardware.
  • PET and CC vendors to forge partnerships for integration and interoperability.
  • Regulators and standards development organizations in order to assess technology specification maturity.

Table of Contents

Introduction

Technology Overview

Multi-Party Computation

Homomorphic Encryption

Differential Privacy

Zero-Knowledge Proof

Synthetic Data

Federated Learning

Trusted Execution Environment

Confidential Computing

Trusted Platform Module

Hardware Security Module

Encryption Key Management & Public Key Infrastructure

Distributed Ledger Technology

Analysis

Summary

 

Related Research Spotlight

Hardware Security Modules

This Spotlight Includes:

Privacy-Enhancing & Secure Computing Technologies
Privacy-Enhancing & Secure Computing Technologies
Hardware Security Modules
Hardware Security Modules
Transforming HSM Markets: A Cloud-based Service Expansion
Transforming HSM Markets: A Cloud-based Service Expansion
Hardware Security Module: Original Equipment Manufacturers
Hardware Security Module: Original Equipment Manufacturers
  • All recently published research
  • Access to any updates to the research published within six months of purchase
  • Direct insight from our analysts through 60 minutes of Analyst Inquiry
View Spotlight