Fortanix Introduces Hardware Security Technology for Database Search
Fortanix, the cybersecurity firm, is pioneering a hardware security technology called Confidential Data Search. The aim of this technology is to assist organizations in securely processing highly sensitive data stored in databases. Through the use of confidential computing technologies, Fortanix allows for data to be searched within a secure hardware vault, ensuring its protection throughout processing.
Confidential Computing: A New Era of Security
Confidential computing provides multiple layers of hardware protection that keep data secure even during processing. In Fortanix‘s system, data is stored in a secure hardware vault, and authorized parties require a code to unlock and access the vault. The data remains inside the vault during processing, eliminating the possibility of exposure to external threats or unauthorized access.
The Role of Chip Technology
Recent advancements in chip technology have made it possible to integrate secure vaults directly into chips. These secure vaults incorporate hardware mechanisms called attestation, which ensure that only authorized parties can access the data stored within. By leveraging these hardware-based security features, Fortanix enhances the confidentiality and integrity of data processing.
Homomorphic Encryption and its Limitations
Homomorphic encryption is commonly used by banks and large enterprises to enable database searches without exposing unencrypted information. This encryption scheme allows users to perform operations directly on encrypted data without converting it into plaintext. However, Richard Searle, Vice President of Confidential Computing at Fortanix, points out that homomorphic encryption may not be optimal for all types of searches. Complex query requests can slow down and complicate homomorphic encryption searches. To address this limitation, Fortanix‘s technology enables searches to be performed directly in plaintext within a trusted execution environment, ensuring the data remains shielded from external access.
Confidential Computing for AI Applications
Fortanix‘s solution also supports Intel’s Trust Domain Extension (TDX) module, a confidential computing technology specifically tailored for AI applications. This technology allows companies to input diverse information into secure vaults, enhancing the proprietary learning models used for AI development. With Fortanix‘s system, third-party datasets can enter and exit the secure vault without the risk of data retention or theft.
Developing a Market for Confidential Computing
The adoption of Fortanix‘s technology, like any emerging solution, relies on demonstrating significant performance improvements or cost savings to gain traction in the market. According to James Sanders, Principal Analyst at CCS Insight, “The technology behind this is secondary to the value it must demonstrate to enterprise buyers.” He emphasizes the importance of third-party options to increase the exposure and adoption of confidential computing technologies. As organizations like banks and hospitals are unlikely to develop their own confidential computing stacks, validated solutions like Fortanix‘s offer the necessary expertise and assurance for widespread adoption.
Implementing Fortanix‘s Technology
Fortanix‘s technology can be implemented either on-premises or in the cloud, utilizing confidential computing hardware enablement such as Intel Secure Guard Extension (SGX) and AMD’s SEV-SNP. The deployment and management of the confidential computing solution are streamlined through a tool called Data Security Manager. This automated deployment system minimizes the need for organizations to heavily involve themselves in the implementation process, as it operates based on predefined policy controls.
Conclusion: The Future of Secure Database Search
Fortanix‘s Confidential Data Search technology represents a significant step forward in ensuring the security and privacy of sensitive data during database search operations. By leveraging confidential computing technologies and hardware-based security measures, Fortanix offers a robust solution that addresses the limitations of homomorphic encryption. While the market for confidential computing is still emerging, Fortanix is well-positioned to educate and guide organizations towards secure and efficient data processing. As the need for secure database search capabilities continues to grow, solutions like Fortanix‘s will play a crucial role in safeguarding highly sensitive information.
<< photo by Mikhail Nilov >>
The image is for illustrative purposes only and does not depict the actual situation.