Microsoft Azure Confidential VMs Will Roll Out This December

We Keep you Connected

Microsoft Azure Confidential VMs Will Roll Out This December

Microsoft Azure Confidential VMs Will Roll Out This December
Your email has been sent
The partnership with Intel allows for hardware-enforced security and confidentiality on 4th Gen Xeon processors.
Organizations using Microsoft Azure will have access to confidential virtual machines in Azure on Dec. 1, allowing greater privacy and compliance. The DCesv5 and ECesv5-series confidential VMs run on 4th Gen Intel Xeon Scalable processors with Intel Trust Domain Extensions (TDX).
The new confidential VMs will be accessible in Microsoft Azure regions Europe West, Europe North, Central U.S. and East U.S. 2.
Confidential virtual machines are suitable for regulated environments and high-security cloud tenants, Intel said. In addition, confidential VMs:
SEE: Windows 10 users can now try out the AI assistant Microsoft Copilot.
Intel points out that confidential computing may be particularly important to organizations in healthcare, finance, retail, government services and industrial or edge deployments.
“Hardware-based Confidential Computing is one of our top focus areas for protecting data that is actively in-use in the memory and CPU, complimenting protections for data at-rest and data in-flight,” Greg Lavender, chief technology officer at Intel, wrote in the announcement post. “Microsoft Azure was an early adopter of Confidential Computing with application isolation using Intel SGX, and now extends its capabilities with Virtual Machine isolation …”
Intel’s Azure DCesv5-series has up to 96 vCPUs and ranges from 4 to 384 GB of memory. The Intel Azure ECesv5 family has up to 128 vCPU and options up to 768 GiB of memory. Both are up to 20% faster than 3rd Gen Intel Xeon virtual machines, Intel and Microsoft stated, and they support remote disks as well as up to 2.8 TB of local disk storage.
Intel Trust Domain Extensions expands the capabilities of Intel Software Guard Extensions, which is a current option for securing Azure instances. In particular, TDX adds more options for confidential computing.
The new confidential VMs add boot-time attestation and confidential disk encryption with enterprise key management options for platform-managed keys and customer-managed keys, Microsoft said.
In addition, new confidential VMs offer options for organizations that want to further separate their duties from their cloud provider, with ephemeral vTPM capability and disk integrity tooling.
Microsoft works with the Confidential Computing Consortium to provide encryption and Windows support for virtual machines. As of Nov. 15, Canonical Ubuntu Server 22.04 LTS is available today with support for Full Disk Encryption.
Microsoft expects SUSE Linux Enterprise Server and Red Hat Enterprise Linux to follow soon.
Other organizations with products in the same space as Microsoft and Intel’s confidential VMs include:
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays
Microsoft Azure Confidential VMs Will Roll Out This December
Your email has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
This is a comprehensive list of the best AI art generators. Explore the advanced technology that transforms imagination into stunning artworks.
Find the perfect payroll service for your business without breaking the bank. Discover the top cheap payroll services, features, pricing and pros and cons.
Is NordVPN worth it? How much does it cost and is it safe to use? Read our NordVPN review to learn about pricing, features, security, and more.
Free project management software provides flexibility for managing projects without paying a cent. Check out our list of the top free project management tools.
Australian and New Zealand enterprises in the public cloud are facing pressure to optimize cloud strategies due to a growth in usage and expected future demand, including for artificial intelligence use cases.
Whether your organization uses Amazon S3, Dropbox, iCloud, OneDrive or another option, cloud data storage services enable collaboration, simplified governance and compliance responsibilities and provide built-in off-site backup advantages. Cloud storage accounts require regular administration and maintenance. As a best practice, someone should regularly review the organization’s file storage accounts. There’s much to remember. Periodic …
Coding a digital video game not only requires a thorough knowledge of programming language, it also requires a deep understanding of the game engine, the APIs and the creative assets that will eventually inhabit the game being produced. Successfully applying all of these skills requires exceptional attention to detail and an inherent ability to collaborate …
Blockchain systems are part of a trend that is moving the internet-of-information era into an internet-of-value era, where assets — and asset ownership — can be transferred instantly and with absolute confidence. Whether you’re a recent hire at an IT department help desk or the CEO of a Fortune 100 company, you need to know …
Retail technology, a.k.a. retailtech, continues to be the driving force behind the changing retail landscape today. Some of the newest developments include scan-and-go checkouts, visual outfitting software and digital price tags. In this glossary, TechRepublic Premium presents more than 90 key retail tech concepts to help your understanding. From the glossary: Brick and click Brick …
Get the web’s best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let’s start with the basics.
* – indicates required fields
Lost your password? Request a new password
Please enter your email adress. You will receive an email message with instructions on how to reset your password.
Check your email for a password reset link. If you didn’t receive an email don’t forgot to check your spam folder, otherwise contact support.
This will help us provide you with customized content.
Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE