The Gap in Conventional Data Security
Enterprise data security operates on two well-understood protection boundaries: data at rest (encrypted on disk, in databases, in object storage) and data in transit (encrypted over the network using TLS). For decades, these two boundaries were sufficient - data was only vulnerable when being actively processed, and processing happened in trusted internal environments.
AI changes this assumption. Enterprises are sending sensitive data to external AI models for inference, outsourcing AI training to cloud environments they do not physically control, and sharing regulated data across organizational boundaries for collaborative AI workloads. In all three cases, data is unencrypted and exposed during processing - in memory, on CPU, visible to the cloud provider's infrastructure and anyone who compromises it.
This is the in-use data problem, and confidential computing is the solution.