{"id":5302,"date":"2021-06-17T17:01:37","date_gmt":"2021-06-17T17:01:37","guid":{"rendered":"https:\/\/www.abrahamsconsulting.com\/blog\/?p=5302"},"modified":"2021-06-17T17:01:37","modified_gmt":"2021-06-17T17:01:37","slug":"azure-confidential-computing-securing-datasets-intel-business","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/","title":{"rendered":"Azure Confidential Computing Securing Datasets | Intel\u00ae Business"},"content":{"rendered":"<p><iframe width=\"560\" height=\"315\" src=\"\/\/www.youtube.com\/embed\/MoYUvwwSJWk\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n    This short video explains that Microsoft Azure, backed by Intel\u00ae Software Guard Extensions (SGX), secures data sets while in use so that only businesses hold the key to the data in a hardware-based, trusted execution environment, and even an administrator or someone with physical access can&#8217;t see it. Please contact Abrahams Consulting LLC for more information about Microsoft Azure backed by Intel\u00ae Software Guard Extensions (SGX).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure sensitive datasets with #Microsoft Azure so that only you hold the key to the data in a hardware-based, trusted execution environment, and even an administrator or someone with physical access can&#8217;t see it. Watch this short video, brought to you by Abrahams Consulting LLC, to learn more about Azure confidential computing backed by Intel\u00ae Software Guard Extensions (SGX).<\/p>\n","protected":false},"author":2,"featured_media":5301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1139,1137,1136],"tags":[],"class_list":["post-5302","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft","category-software","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Azure Confidential Computing Securing Datasets | Intel\u00ae Business - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Azure Confidential Computing Securing Datasets | Intel\u00ae Business - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Secure sensitive datasets with #Microsoft Azure so that only you hold the key to the data in a hardware-based, trusted execution environment, and even an administrator or someone with physical access can&#039;t see it. Watch this short video, brought to you by Abrahams Consulting LLC, to learn more about Azure confidential computing backed by Intel\u00ae Software Guard Extensions (SGX).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-17T17:01:37+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Azure Confidential Computing Securing Datasets | Intel\u00ae Business\",\"datePublished\":\"2021-06-17T17:01:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\"},\"wordCount\":74,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg\",\"articleSection\":[\"Microsoft\",\"Software\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\",\"name\":\"Azure Confidential Computing Securing Datasets | Intel\u00ae Business - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg\",\"datePublished\":\"2021-06-17T17:01:37+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Confidential Computing Securing Datasets | Intel\u00ae Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Azure Confidential Computing Securing Datasets | Intel\u00ae Business - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/","og_locale":"en_US","og_type":"article","og_title":"Azure Confidential Computing Securing Datasets | Intel\u00ae Business - TechTonic Times","og_description":"Secure sensitive datasets with #Microsoft Azure so that only you hold the key to the data in a hardware-based, trusted execution environment, and even an administrator or someone with physical access can't see it. Watch this short video, brought to you by Abrahams Consulting LLC, to learn more about Azure confidential computing backed by Intel\u00ae Software Guard Extensions (SGX).","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/","og_site_name":"TechTonic Times","article_published_time":"2021-06-17T17:01:37+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Azure Confidential Computing Securing Datasets | Intel\u00ae Business","datePublished":"2021-06-17T17:01:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/"},"wordCount":74,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg","articleSection":["Microsoft","Software","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/","name":"Azure Confidential Computing Securing Datasets | Intel\u00ae Business - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg","datePublished":"2021-06-17T17:01:37+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2021\/06\/maxresdefault-9.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/azure-confidential-computing-securing-datasets-intel-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Confidential Computing Securing Datasets | Intel\u00ae Business"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=5302"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/5302\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/5301"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=5302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=5302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=5302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}