UPDATED 17:59 EST / JANUARY 23 2023

CLOUD

‘Confidential security’: The security perimeter should shift from box to asset, says Anjuna CEO

Moving the security perimeter to the workload and away from the machine will radicalize protection in ways never seen before, says a cybersecurity expert who is proposing to completely upend the base concepts behind protection.

“What happens in the machine doesn’t matter anymore,” said Ayal Yogev (pictured), chief executive officer and co-founder of Anjuna Security Inc. “Even if somebody gets root access — full access to the infrastructure — they don’t have access to anything.”

Yogev spoke with theCUBE industry analysts Savannah Peterson and Paul Gillin at the recent AWS re:Invent conference, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio. They discussed the concepts behind confidential computing security. (* Disclosure below.)

Workers can’t get it

Yogev is talking about the concept of what he calls confidential security. “The first thing that this is going to enable is essentially moving everything to the public cloud,” he said.

That includes sensitive government data that has previously required a dedicated government-built cloud. “If the clouds get hacked, your data is safe,” he added.

The perimeter isn’t at the box, in other words, it’s at the property or asset. “If an employee of the cloud decides to get access to your data, they can’t, Yogev added. “They just don’t have any access. Or if the government comes to the cloud with a subpoena, the clouds can’t give them access.”

Anjuna’s premise is basically the encryption of data and policy-based verifying of code that creates confidential runtimes.

Yogev draws a confidential computing comparison with how virtualization took hold: “VMware built a software stack to make it simple to virtualize anything. To some extent, that was the birth of the public cloud. We would never have a public cloud without virtualization,” he stated. “I think this is going to be similar to how no network was encrypted 10 years ago and today every network is encrypted with TLS and HTTPS.”

Of the future? “Within a few years, all [RAM] memory is going to be encrypted,” he said. Edge computing a big benefactor, he added.

Here’s the complete video interview, part of SiliconANGLE’s and theCUBE’s coverage of AWS re:Invent:

(* Disclosure: Anjuna Security Inc. sponsored this segment of theCUBE. Neither Anjuna Security nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo: SiliconANGLE

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.