Cohesity, a pioneer in AI-powered data security and management, announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leveraged with Fort Knox, Cohesity’s cyber vault service, this data-in-use encryption innovation will be the first of its kind in the data management industry.

Together, Cohesity and Intel are solving one of the most pressing cybersecurity challenges for CIOs. Traditionally, options have been limited for protecting data in use while it is actively processed in memory, which can leave data unencrypted and vulnerable to insider attacks. Confidential computing enabled by Intel® Software Guard Extensions (Intel® SGX) will support Cohesity customers to reduce the risk posed by potential bad actors accessing data while it is being processed in main memory. This is especially critical for highly regulated industries like financial institutions, healthcare, and government.

Cohesity Data Cloud

Cohesity’s flagship platform, Cohesity Data Cloud, has long included many proven and cutting-edge technologies to help the world’s largest organisations manage and secure their most critical data from cyber criminals. Cohesity and Intel are joining forces to reduce customers’ risk of cyber threat by: 

  • Creating a unique solution that will protect encryption keys that secure customer data in a hardware-secured environment leveraging Intel SGX for confidential computing in the cloud.
  • This solution dramatically reduces the risk posed by data exfiltration, as the data is not viewable or downloadable by any privileged accounts when the data is being processed in memory as it is encrypted. 
  • Providing a way for Cohesity customers to verify that their Intel SGX is legitimate by using Intel® Trust Authority, which has the latest patches and only runs the dedicated Cohesity application before extracting the data encryption key. 

Intel SGX

We are relentlessly focused on innovation that furthers our mission: To protect, secure, and provide insights into the world’s data. Collaborations with the biggest and most trusted names in tech, like Intel, are the reason why the largest global enterprises rely on us to strengthen their business resilience,” said Sanjay Poonen, CEO and President of Cohesity. “With Intel SGX, Intel Trust Authority, and confidential computing, our customers will benefit from reduced risk and increased security in cloud environments, allowing them to focus on what really matters, their business.”

Intel is a pioneer and leader in data centre confidential computing technologies, enabling customers, especially those handling sensitive or highly regulated data, to address their needs of confidentiality, integrity, and attestation for their workloads,” said Greg Lavender, executive vice president and chief technology officer at Intel Corporation. “Cohesity’s adoption of our technology reflects the growing customer need to protect critical data in the cloud and advances our common goal of delivering a secure computing environment combined with the trust customers expect.”

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?