{"id":3502,"date":"2020-11-02T00:27:17","date_gmt":"2020-11-02T00:27:17","guid":{"rendered":"https:\/\/techclot.com\/index.php\/2020\/11\/02\/wipro-and-ibm-target-industry-specific-hybrid-cloud-solutions-aided-by-red-hat\/"},"modified":"2020-11-02T00:27:17","modified_gmt":"2020-11-02T00:27:17","slug":"wipro-and-ibm-target-industry-specific-hybrid-cloud-solutions-aided-by-red-hat","status":"publish","type":"post","link":"https:\/\/techclot.com\/index.php\/2020\/11\/02\/wipro-and-ibm-target-industry-specific-hybrid-cloud-solutions-aided-by-red-hat\/","title":{"rendered":"Wipro and IBM target industry specific hybrid cloud solutions, aided by Red Hat"},"content":{"rendered":"<p><a href=\"https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/sg.channelasia.tech\/article\/684174\/wipro-ibm-target-industry-specific-hybrid-cloud-solutions-aided-by-red-hat\/&#038;ct=ga&#038;cd=CAIyHDkyYmU1MGQ5NjY1NjYxZTA6Y28udWs6ZW46R0I&#038;usg=AFQjCNHH5Iu9T-GhmkK6qxp8jfU8z6hhnA\">Wipro and IBM target industry specific hybrid cloud solutions, aided by Red Hat<\/a><\/p>\n<div class=\"story_images\">\n<figure>\n<p>          <img data-recalc-dims=\"1\" decoding=\"async\" alt=\"Bhanumurthy B.M (Wipro)\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/cJpBxz.jpg?w=640&#038;ssl=1\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><figcaption>\n<p>Bhanumurthy B.M (Wipro)<\/p>\n<\/figcaption><span class=\"image-license\"><\/p>\n<p>            <span>Credit:  Wipro <\/span><\/p>\n<p>          <\/span><\/p>\n<\/figure><\/div>\n<p>Wipro has unveiled plans to expand IBM Hybrid Cloud Practice capabilities, incorporating Red Hat technologies to create industry specific solutions in relation to workload migration deployments.<\/p>\n<p>Supported by in-house technical specialisation &#8211; in addition to Big Blue expertise &#8211; the practice aims to help customers modernise digital operations across hybrid cloud environments by leveraging IBM Cloud Paks and containerised software running on Red Hat OpenShift.<\/p>\n<p>\u201cWipro empowers customers across industries to re-imagine their cloud journey with its business-first strategy and industrialised solutions approach,\u201d said Bhanumurthy B.M, president and COO of Wipro. \u201cWe believe the future will be driven by hybrid cloud hence, the expansion of IBM Hybrid cloud practice is intrinsic to our strategy. It will strengthen our relationship with IBM and help accelerate our clients\u2019 transformation journey across hybrid cloud environments.\u201d<\/p>\n<p>Businesses can also leverage Wipro solutions such as BoundaryLess Enterprise (BLE) and ModernizR, built with IBM Cloud Paks on Red Hat OpenShift and capable of running in any cloud environment.<\/p>\n<p>Specifically, BLE operates as a hybrid cloud management platform allowing customers to run cloud-native applications from anywhere, supporting containers, infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS) computing models in the process. Meanwhile, ModernizR supports enterprise users moving legacy applications to the cloud by leveraging artificial intelligence (AI) to mine and analyse legacy applications and data.<\/p>\n<aside id=\"brand-post-promo-placeholder-slot\"><\/aside>\n<p>\u201cThe expansion of our relationship with Wipro reinforces our joint commitment to help clients accelerate their journey to cloud across industries, including highly regulated sectors such as financial services, energy and utilities, manufacturing and healthcare,\u201d added Bob Lord, senior vice president of Cognitive Applications and Ecosystems at IBM.<\/p>\n<p>\u201cWipro\u2019s industry knowledge, combined with IBM\u2019s hybrid cloud and AI platform powered by Red Hat OpenShift, can help enterprises drive real business transformation by migrating and managing their critical workloads across an open hybrid cloud environment.\u201d<\/p>\n<p>The extended alliance comes almost five months after Wipro increased collaboration with IBM and Red Hat to help drive hybrid cloud adoption through the launch of a dedicated innovation centre in India.<\/p>\n<p><a href=\"https:\/\/sg.channelasia.tech\/article\/680343\/wipro-joins-forces-ibm-red-hat-unveils-hybrid-cloud-innovation-centre\/\" target=\"_blank\" rel=\"noopener noreferrer\">As reported by <em>Channel Asia<\/em><\/a><em><\/em>, the Wipro IBM Novus Lounge &#8211; housed at the global system integrator\u2019s Kodathi campus in Bengaluru &#8211; offers expertise across cloud, AI, machine learning and the Internet of Things, targeting enterprise customers, developers and start-ups.<\/p>\n<aside class=\"readmore\">\n<div class=\"nocontent\">\n<a class=\"image\" href=\"https:\/\/www.arnnet.com.au\/article\/684070\/azure-steers-microsoft-q1-revenue-37b\/\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/zJUwSj.jpg?w=640&#038;ssl=1\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><\/a><br \/>\n<span class=\"text\"><strong>Read more<\/strong> <a href=\"https:\/\/www.arnnet.com.au\/article\/684070\/azure-steers-microsoft-q1-revenue-37b\/\">Azure steers Microsoft to Q1 revenue of $37B<\/a><\/span>\n<\/div>\n<\/aside>\n<p>Customers will be offered remote access to IBM and Red Hat solutions with Wipro leveraging IBM Cloud offerings and technologies, supported by in-house services to develop industry solutions for clients across key industry sectors.<\/p>\n<div id=\"article_bottom_promo\">\n<p><center><br \/>\n<a href=\"https:\/\/sg.channelasia.tech\/user\/register\/?destination=\/user\/mailing_list\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/E4bvg5.png?w=280&#038;ssl=1\"  src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><\/a><br \/>\n<\/center><\/p>\n<\/div>\n<aside class=\"readmore\" id=\"brand-post-in-article-promo\">\n<\/aside>\n<p class=\"tags\">\n        Tags <a href=\"https:\/\/sg.channelasia.tech\/tag\/ibm\/\">IBM<\/a><a href=\"https:\/\/sg.channelasia.tech\/tag\/red-hat\/\">Red Hat<\/a><a href=\"https:\/\/sg.channelasia.tech\/tag\/wipro\/\">wipro<\/a><a href=\"https:\/\/sg.channelasia.tech\/tag\/cloud\/\">Cloud<\/a><a href=\"https:\/\/sg.channelasia.tech\/tag\/hybrid-cloud\/\">hybrid cloud<\/a>\n      <\/p>\n<aside class=\"art-readnext readnext\">\n<\/aside>\n<p>Published at Sun, 01 Nov 2020 22:30:00 +0000<\/p>\n<p><a href=\"https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/www.nanalyze.com\/2020\/11\/big-data-privacy-machine-learning\/&#038;ct=ga&#038;cd=CAIyHDkyYmU1MGQ5NjY1NjYxZTA6Y28udWs6ZW46R0I&#038;usg=AFQjCNGiSz2rSAN6l-HLqkTPrdJFL_1aaA\">6 Privacy Solutions for Big Data and Machine Learning<\/a><\/p>\n<p><p>Travelers who wander <a rel=\"noreferrer noopener\" aria-label=\"the banana pancake trail (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Banana_Pancake_Trail\" target=\"_blank\">the banana pancake trail<\/a> through Southeast Asia will all get roughly the same experience. They\u2019ll eat crummy food on one of fifty boats floating around Halong Bay, then head up to the highlands of Sapa for a faux cultural experience with hill tribes that grow dreadful cannabis. After that, it\u2019s on to Laos to float the river in Vang Vien while smashed on opium tea. Eventually, you\u2019ll see someone wearing a t-shirt with the classic slogan \u2013 \u201csame same, but different.\u201d<\/p>\n<p>The <a rel=\"noreferrer noopener\" aria-label=\"origins of this phrase (opens in a new tab)\" href=\"https:\/\/theculturetrip.com\/asia\/thailand\/articles\/same-same-but-different-the-origins-of-thailands-tourist-catchphrase\/\" target=\"_blank\">origins of this phrase<\/a> surround the Southeast Asian vendors who often respond to queries about the authenticity of fake goods they\u2019re selling with \u201csame same, but different.\u201d It\u2019s a phrase that appropriately describes how the technology world loves to spin things as fresh and new when they\u2019ve hardly changed at all. Look no further than startup Panoply, \u201ca five-year-old, San Francisco-based platform that makes it easier for businesses to set up a data warehouse and analyze that data with standard SQL queries.\u201d So, we\u2019re back to <a rel=\"noreferrer noopener\" aria-label=\"Kimball vs. Inmon (opens in a new tab)\" href=\"https:\/\/www.nanalyze.com\/2018\/12\/big-data-vs-data-warehouses\/\" target=\"_blank\">Kimball vs. Inmon<\/a> again. (<em>Rolls eyes.<\/em>)<\/p>\n<p>In our recent piece on <strong><a rel=\"noreferrer noopener\" aria-label=\"9 Technology Trends You Should Know For 2021 (opens in a new tab)\" href=\"https:\/\/www.nanalyze.com\/2020\/10\/9-technology-trends-2021\/\" target=\"_blank\">9 Technology Trends You Should Know For 2021<\/a><\/strong>, we talked about something that\u2019s actually different \u2013 the notion of \u201cprivacy-enhancing computation,\u201d which lets organizations safely share data in untrusted environments. Two technology concepts that you\u2019ll hear used in this context are <a rel=\"noreferrer noopener\" aria-label=\"Federated Learning Explained Simply (opens in a new tab)\" href=\"https:\/\/www.nanalyze.com\/2020\/01\/federated-learning-explained\/\" target=\"_blank\">federated learning<\/a> and homomorphic encryption.<\/p>\n<h2>What is Homomorphic Encryption?<\/h2>\n<p>Artificial intelligence algorithms \u2013 or machine learning algorithms \u2013 are only as good as the big data you feed them. Companies with exclusive access to large proprietary datasets have a competitive advantage because they can extract valuable insights from that data. Now, imagine if the data you want to use falls under the growing list of global privacy and data regulations like<br \/>CCPA, GDPR, HIPAA, BSA, CYA, etc. You\u2019ll then need to convince the stiff collars in compliance that your \u201c<a rel=\"noreferrer noopener\" aria-label=\"citizen developers (opens in a new tab)\" href=\"https:\/\/www.nanalyze.com\/2020\/10\/unqork-no-code-platform\/\" target=\"_blank\">citizen developers<\/a>\u201d need access to it. Think about how much absolute tripe you\u2019ll have to deal with from Mordac, The Preventer of Information Services.<\/p>\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/1LpV4S.gif?w=640&#038;ssl=1\" alt class=\"wp-image-61030 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><figcaption> Source: The remarkably good looking, intelligent, funny man who doesn\u2019t age and never sends us cease and desists when we use his comic strips, Scott Adams <\/figcaption><\/figure>\n<p>Often referred to as \u201c<a rel=\"noreferrer noopener\" aria-label=\"the Holy Grail of cryptography (opens in a new tab)\" href=\"https:\/\/ieeexplore.ieee.org\/document\/7924692\" target=\"_blank\">the Holy Grail of cryptography<\/a>,\u201d homomorphic encryption makes data privacy concerns a non-issue for development teams. Says Gartner, \u201chomomorphic encryption enables businesses to share data without compromising privacy.\u201d Simply put, it acts like a firewall between the actual data and your developers by generating a representative data set which consists of <a href=\"https:\/\/www.nanalyze.com\/2019\/07\/creating-synthetic-data-computer-vision\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"synthetic data (opens in a new tab)\">synthetic data<\/a>. While these methods have been around for a while, they\u2019re only now becoming fast enough to be viable. Today, we\u2019ll look at five startups working on variants of the homomorphic encryption theme.<\/p>\n<h2>5 Privacy Solutions for Big Data and Machine Learning<\/h2>\n<p>Our first startup believes their competitive advantage is speed, and their pedigree makes that very believable.  <\/p>\n<h3>Duality \u2013 Faster is Better<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><a href=\"https:\/\/dualitytech.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/IiFIHI.png?w=640&#038;ssl=1\" alt class=\"wp-image-61032 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/a><\/figure>\n<\/div>\n<p>Those who complain about a lack of women engineers rarely question why women\u2019s magazines often feature celebrities who can\u2019t speak in complete sentences instead of accomplished women like <a rel=\"noreferrer noopener\" aria-label=\"Shafi Goldwasser (opens in a new tab)\" href=\"https:\/\/amturing.acm.org\/award_winners\/goldwasser_8627889.cfm\" target=\"_blank\">Shafi Goldwasser<\/a>. She\u2019s a computer scientist whose long list of accomplishments includes a Turing Award in 2012 for pioneering new methods for efficient verification of mathematical proofs in complexity theory. Four years later, she co-founded New Joisey startup Duality Technologies which has taken in <strong>$20 million<\/strong> in funding so far from investors that include Intel (<a href=\"https:\/\/www.bloomberg.com\/quote\/INTC:US\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"INTC (opens in a new tab)\">INTC<\/a>) and media giant Hearst. <\/p>\n<p>All that money is being used to build the Duality SecurePlus\u2122 platform&nbsp;which encrypts sensitive data and the machine learning algorithms that learn from it. With applications in&nbsp;financial services, healthcare, and telecommunications, Duality landed a contract with DARPA this summer to use the platform for researching genomic susceptibility to severe COVID-19 symptoms, something they could do 30X faster than alternative solutions. They\u2019re also working with Canada\u2019s Scotiabank  to help banks join forces to fight money laundering and financial crime by sharing information without exposing sensitive data.&nbsp; <\/p>\n<h3>Datafleets and Synthetic Data<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><a href=\"https:\/\/www.datafleets.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/DhD9fz.jpg?w=640&#038;ssl=1\" alt class=\"wp-image-61038 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/a><\/figure>\n<\/div>\n<p>Founded in 2018, San Francisco startup Datafleets has taken in <strong>$4.5 million<\/strong> in disclosed funding which all came in the form of a seed round that closed last week with investors that include LG Electronics and Marc Cuban. That money is being spent by some Stanford dropouts to build a platform that lets developers conduct <strong>e<\/strong>xtract-<strong>t<\/strong>ransfer-<strong>l<\/strong>oad (<strong>ETL<\/strong>) operations, business analytics, and machine learning without ever seeing raw row-level data. <\/p>\n<p>Upon connection to a dataset, DataFleets automatedly generates synthetic data that is structurally representative of the underlying plaintext. No individual\u2019s data can be \u201creverse-engineered\u201d from statistical queries or machine learning, and analytics themselves are always run on the raw data. All the typical use cases are in scope such as fraud analytics, crossing Chinese walls, try-before-you-buy data, and medical image sharing across institutions while adhering to medical privacy rules.<\/p>\n<h3>Cosmian\u2019s Cyphercompute<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><a href=\"https:\/\/cosmian.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/4qPMIq.png?w=640&#038;ssl=1\" alt class=\"wp-image-61040 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/a><\/figure>\n<\/div>\n<p>Founded in 2018, French startup Cosmian has taken in around <strong>$1.6 million<\/strong> in funding from a bunch of French guys you\u2019ve never heard of. They\u2019ve built a platform, Cyphercompute, that encrypts confidential data such that it stays encrypted during processing and never needs to be revealed in clear text. Any company that wants to extract insights from sensitive and confidential data would be a potential client for Cosmian.<\/p>\n<h3>Enveil \u2013 Protecting Data in Use<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><a href=\"https:\/\/www.enveil.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/3YXT6i.png?w=640&#038;ssl=1\" alt class=\"wp-image-61041 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/a><\/figure>\n<\/div>\n<p>Founded in 2016, Baltimore startup Enveil has taken in <strong>$15 million<\/strong> in disclosed funding from investors that include Bloomberg, Capital One, Thomson Reuters, and Mastercard. Enveil\u2019s ZeroReveal\u00ae&nbsp;solutions protect data while it\u2019s being used or processed, what they refer to as \u201cdata in use.\u201d <\/p>\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/iRfDxc.jpg?w=640&#038;ssl=1\" alt class=\"wp-image-61045 lazyload\" data-srcset=\"https:\/\/techclot.com\/wp-content\/uploads\/2020\/11\/iRfDxc.jpg 657w, https:\/\/cdn.nanalyze.com\/uploads\/2020\/11\/Data-in-Use-300x261.jpg 300w\" data-sizes=\"(max-width: 657px) 100vw, 657px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/figure>\n<p>Founded by U.S. Intelligence Community alumni, they\u2019re the only company certified to provide nation-state level security in the processing layer. The solution is market ready, scalable, and can integrate without any required changes to existing database and storage technologies.<\/p>\n<h3>Inpher \u2013 Secret Computing<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/xulLsa.jpg?w=640&#038;ssl=1\" alt class=\"wp-image-61035 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/figure>\n<\/div>\n<p>Founded in 2015, New Yawk startup has taken in <strong>$14 million<\/strong> in disclosed funding from investors that include JP Morgan Chase, the lead investor in their last round, a Series A of $10 million raised about two years ago. Some of the world\u2019s largest financial services, technology, and manufacturing companies are using Inpher\u2019s Secret Computing platform for a variety of use cases, many of which the company details on their website.<\/p>\n<p>One good example in healthcare is enabling clinical trials researchers with secure access to distributed, private <strong>e<\/strong>lectronic <strong>h<\/strong>ealth <strong>r<\/strong>ecord (<strong>EHR<\/strong>) repositories for improved patient selection and matching while maintaining privacy and compliance. <\/p>\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/UZbHg9.jpg?w=640&#038;ssl=1\" alt class=\"wp-image-61052 lazyload\" data-srcset=\"https:\/\/techclot.com\/wp-content\/uploads\/2020\/11\/UZbHg9.jpg 750w, https:\/\/cdn.nanalyze.com\/uploads\/2020\/11\/Clinical-Trials-Using-HE-300x234.jpg 300w\" data-sizes=\"(max-width: 750px) 100vw, 750px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/figure>\n<p>Today, customers are using Secret Computing\u00ae to better detect financial fraud, aggregate model features across private datasets, better predict heart disease, and much more.  <\/p>\n<h3>Fortanix and Runtime Encryption<\/h3>\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-large\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/xKg6yc.png?w=640&#038;ssl=1\" alt class=\"wp-image-61054 lazyload\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/figure>\n<\/div>\n<p>Last but not least is a startup that offered the first commercially available runtime encryption back in 2017 using <a rel=\"noreferrer noopener\" aria-label=\"Intel\u00ae SGX (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Software_Guard_Extensions\" target=\"_blank\">Intel\u00ae SGX<\/a> (<em>a set of security-related instruction codes that are built into some modern Intel central processing units<\/em>). Founded in 2016, Silicon Valley startup Fortanix has taken in <strong>$31 million<\/strong> in funding from investors that include Intel whose technology they\u2019re using to provide a hardware foundation that encrypts sensitive data as it\u2019s being processed. The company provides solutions for confidential computing, encryption, key management, secrets management, tokenization, and hardware security modules. They\u2019ve <a rel=\"noreferrer noopener\" aria-label=\"partnered with VMware (opens in a new tab)\" href=\"https:\/\/www.fortanix.com\/company\/pr\/2020\/09\/fortanix-partners-with-vmware-to-enable-cloud-service-providers-to-deliver-data-security-as-a-service\/\" target=\"_blank\">partnered with VMware<\/a> to enable cloud service providers to deliver data security as a service, and also appear to be <a rel=\"noreferrer noopener\" aria-label=\"sidling up to Microsoft as well (opens in a new tab)\" href=\"https:\/\/www.fortanix.com\/company\/pr\/2020\/04\/fortanix-data-security-platform-now-available-on-microsoft-azure-to-enhance-private-data-protection-in-the-public-cloud\/\" target=\"_blank\">sidling up to Microsoft as well<\/a>.<\/p>\n<h2>Conclusion<\/h2>\n<p>The six startups we\u2019ve discussed in today\u2019s article are hardly the only companies working on data privacy solutions for big data and machine learning. Large companies like IBM (<a rel=\"noreferrer noopener\" aria-label=\"IBM (opens in a new tab)\" href=\"https:\/\/www.bloomberg.com\/quote\/IBM:US\" target=\"_blank\">IBM<\/a>) are <a rel=\"noreferrer noopener\" aria-label=\"dabbling in this (opens in a new tab)\" href=\"https:\/\/www.ibm.com\/blogs\/research\/2018\/03\/elegant-disgusting-cryptography\/\" target=\"_blank\">dabbling in this<\/a> too, and it was IBM scientist <a rel=\"noreferrer noopener\" aria-label=\"Craig Gentry (opens in a new tab)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Craig_Gentry_(computer_scientist)\" target=\"_blank\">Craig Gentry<\/a> who first created a working instance of homomorphic encryption. We\u2019ve learned <a rel=\"noreferrer noopener\" aria-label=\"not to expect much from IBM (opens in a new tab)\" href=\"https:\/\/www.nanalyze.com\/2020\/07\/ibm-artificial-intelligence\/\" target=\"_blank\">not to expect much from IBM<\/a>, but homomorphic encryption sounds like the perfect solution for securing <a rel=\"noreferrer noopener\" aria-label=\"a hybrid cloud environment (opens in a new tab)\" href=\"https:\/\/www.nanalyze.com\/2018\/10\/ibm-red-hat-hybrid-cloud\/\" target=\"_blank\">a hybrid cloud environment<\/a>.<\/p>\n<p>The real value in homomorphic encryption is that it unlocks value in all the datasets that were previously inaccessible due to data privacy reasons. It also helps many the CTO sleep well at night with the understanding that there are far fewer ways for a data breach to happen, the ultimate <a href=\"https:\/\/www.urbandictionary.com\/define.php?term=CLM%3A%20Career%20Limiting%20Move\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"CLM (opens in a new tab)\">CLM<\/a> for a CTO. Soon, it may just become the de facto standard for ensuring sensitive data is sufficiently protected.<\/p>\n<p>Pure-play disruptive tech stocks are not only hard to find, but investing in them is risky business. That&#8217;s why&nbsp;we created \u201c<a href=\"https:\/\/www.nanalyze.com\/the-nanalyze-disruptive-tech-portfolio-report\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>The Nanalyze Disruptive Tech Portfolio Report<\/b><\/a>,\u201d which lists 20<span>&nbsp;<\/span>disruptive tech<span>&nbsp;<\/span>stocks we love so much we\u2019ve invested in them ourselves. Find out which tech stocks we love, like, and avoid in this special report, now available for all <a href=\"https:\/\/www.nanalyze.com\/become-a-nanalyze-premium-subscriber\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nanalyze Premium<\/a>&nbsp;annual subscribers.<\/p>\n<p><a href=\"https:\/\/www.nanalyze.com\/the-nanalyze-disruptive-tech-portfolio-report\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"640\" height=\"163\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/wmlQMg.jpg?resize=640%2C163&#038;ssl=1\" class=\"aligncenter wp-post-image lazyload\" alt data-srcset=\"https:\/\/techclot.com\/wp-content\/uploads\/2020\/11\/wmlQMg.jpg 750w, https:\/\/cdn.nanalyze.com\/uploads\/2020\/09\/Nanalyze_banner_750x191px_Disruptive_v3-300x76.jpg 300w\" data-sizes=\"(max-width: 750px) 100vw, 750px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/163;\"><\/a><\/p>\n<\/p>\n<p>Published at Sun, 01 Nov 2020 21:00:00 +0000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wipro and IBM target industry specific hybrid cloud solutions, aided by Red Hat Bhanumurthy B.M&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3489,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3502","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/11\/cJpBxz.jpg?fit=740%2C462&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3orZX-Uu","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/3502","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/comments?post=3502"}],"version-history":[{"count":0,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/3502\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media\/3489"}],"wp:attachment":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media?parent=3502"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/categories?post=3502"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/tags?post=3502"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}