undefined cover
undefined cover
7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive cover
7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive cover
European Tech Talks

7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive

7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive

36min |24/09/2024
Play
undefined cover
undefined cover
7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive cover
7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive cover
European Tech Talks

7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive

7. The importance of confidential cloud computing in Europe, Sebastian Gajek, Enclaive

36min |24/09/2024
Play

Description

Sebastian Gajek, co-founder of  @confidentialcompute  , discusses the importance of confidential cloud computing in a European context. He explains how Enclaive's technology allows users to run applications in the cloud while ensuring security and confidentiality. Sebastian highlights the need for data sovereignty and compliance with European regulations, especially in light of the Cloud Act. He also discusses the maturity of clients in understanding and adopting confidential computing and the potential for a multi-cloud approach. Sebastian emphasizes the trust and familiarity that comes with working with a local European player in the cloud computing space.


https://www.enclaive.io/

https://www.linkedin.com/company/enclaive https://www.youtube.com/channel/UChuBVOzH6WY7d31UcqMgMLg


Key take aways:

  • Confidential cloud computing allows users to run applications in the cloud while ensuring security and confidentiality. - Data sovereignty and compliance with European regulations are important considerations in the adoption of cloud technologies.

  • The maturity of clients in understanding and adopting confidential computing is increasing, and it is becoming a cloud computing standard.

  • A multi-cloud approach, combining European cloud providers and hyperscalers, can provide the best of both worlds in terms of scalability, availability, and data security.

  • Working with a local European player in the cloud computing space can provide trust and familiarity.


Chapters 00:00 Introduction and Background

08:21 Confidential Computing and Security

17:40 Data Sovereignty and Compliance

19:30 Maturity and Adoption of Confidential Computing

26:16 The Potential of a Multi-Cloud Approach

28:52 Trust and Familiarity with European Players


Hosted by Ausha. See ausha.co/privacy-policy for more information.

Description

Sebastian Gajek, co-founder of  @confidentialcompute  , discusses the importance of confidential cloud computing in a European context. He explains how Enclaive's technology allows users to run applications in the cloud while ensuring security and confidentiality. Sebastian highlights the need for data sovereignty and compliance with European regulations, especially in light of the Cloud Act. He also discusses the maturity of clients in understanding and adopting confidential computing and the potential for a multi-cloud approach. Sebastian emphasizes the trust and familiarity that comes with working with a local European player in the cloud computing space.


https://www.enclaive.io/

https://www.linkedin.com/company/enclaive https://www.youtube.com/channel/UChuBVOzH6WY7d31UcqMgMLg


Key take aways:

  • Confidential cloud computing allows users to run applications in the cloud while ensuring security and confidentiality. - Data sovereignty and compliance with European regulations are important considerations in the adoption of cloud technologies.

  • The maturity of clients in understanding and adopting confidential computing is increasing, and it is becoming a cloud computing standard.

  • A multi-cloud approach, combining European cloud providers and hyperscalers, can provide the best of both worlds in terms of scalability, availability, and data security.

  • Working with a local European player in the cloud computing space can provide trust and familiarity.


Chapters 00:00 Introduction and Background

08:21 Confidential Computing and Security

17:40 Data Sovereignty and Compliance

19:30 Maturity and Adoption of Confidential Computing

26:16 The Potential of a Multi-Cloud Approach

28:52 Trust and Familiarity with European Players


Hosted by Ausha. See ausha.co/privacy-policy for more information.

Share

Embed

You may also like

Description

Sebastian Gajek, co-founder of  @confidentialcompute  , discusses the importance of confidential cloud computing in a European context. He explains how Enclaive's technology allows users to run applications in the cloud while ensuring security and confidentiality. Sebastian highlights the need for data sovereignty and compliance with European regulations, especially in light of the Cloud Act. He also discusses the maturity of clients in understanding and adopting confidential computing and the potential for a multi-cloud approach. Sebastian emphasizes the trust and familiarity that comes with working with a local European player in the cloud computing space.


https://www.enclaive.io/

https://www.linkedin.com/company/enclaive https://www.youtube.com/channel/UChuBVOzH6WY7d31UcqMgMLg


Key take aways:

  • Confidential cloud computing allows users to run applications in the cloud while ensuring security and confidentiality. - Data sovereignty and compliance with European regulations are important considerations in the adoption of cloud technologies.

  • The maturity of clients in understanding and adopting confidential computing is increasing, and it is becoming a cloud computing standard.

  • A multi-cloud approach, combining European cloud providers and hyperscalers, can provide the best of both worlds in terms of scalability, availability, and data security.

  • Working with a local European player in the cloud computing space can provide trust and familiarity.


Chapters 00:00 Introduction and Background

08:21 Confidential Computing and Security

17:40 Data Sovereignty and Compliance

19:30 Maturity and Adoption of Confidential Computing

26:16 The Potential of a Multi-Cloud Approach

28:52 Trust and Familiarity with European Players


Hosted by Ausha. See ausha.co/privacy-policy for more information.

Description

Sebastian Gajek, co-founder of  @confidentialcompute  , discusses the importance of confidential cloud computing in a European context. He explains how Enclaive's technology allows users to run applications in the cloud while ensuring security and confidentiality. Sebastian highlights the need for data sovereignty and compliance with European regulations, especially in light of the Cloud Act. He also discusses the maturity of clients in understanding and adopting confidential computing and the potential for a multi-cloud approach. Sebastian emphasizes the trust and familiarity that comes with working with a local European player in the cloud computing space.


https://www.enclaive.io/

https://www.linkedin.com/company/enclaive https://www.youtube.com/channel/UChuBVOzH6WY7d31UcqMgMLg


Key take aways:

  • Confidential cloud computing allows users to run applications in the cloud while ensuring security and confidentiality. - Data sovereignty and compliance with European regulations are important considerations in the adoption of cloud technologies.

  • The maturity of clients in understanding and adopting confidential computing is increasing, and it is becoming a cloud computing standard.

  • A multi-cloud approach, combining European cloud providers and hyperscalers, can provide the best of both worlds in terms of scalability, availability, and data security.

  • Working with a local European player in the cloud computing space can provide trust and familiarity.


Chapters 00:00 Introduction and Background

08:21 Confidential Computing and Security

17:40 Data Sovereignty and Compliance

19:30 Maturity and Adoption of Confidential Computing

26:16 The Potential of a Multi-Cloud Approach

28:52 Trust and Familiarity with European Players


Hosted by Ausha. See ausha.co/privacy-policy for more information.

Share

Embed

You may also like