Report by Confidential Computing Consortium

Unlocking the Future of Data Security: Confidential Computing as a Strategic Imperative

11 FINDINGSPublished Dec 3, 2025
View Original Report →

Key Findings

73% of organizations report confidentiality with proven technical assurances as a benefit of Confidential Computing.

Confidential ComputingTechnical assurance

68% of organizations report better regulatory compliance as a benefit of Confidential Computing.

Confidential ComputingRegulatory Compliance

71% of public cloud users are the most likely to implement Confidential Computing technology, compared to 45% of hybrid/distributed cloud users.

Confidential ComputingCloud ComputingPublic CloudHybrid CloudDistributed Cloud

57% of organizations are currently piloting Confidential Computing.

Confidential Computing

Canada and the United States reported the highest percentages of Confidential Computing services in full production, at 26% and 24%, respectively.

Confidential ComputingData SecurityCanadaUnited States

18% of organizations have Confidential Computing already in production.

Confidential Computing

77% of organizations are more likely to consider Confidential Computing due to the Digital Operational Resilience Act's specific requirement to protect data in use.

Confidential ComputingData ProtectionRegulatory ComplianceDORA

88% of organizations report improved data integrity as the primary benefit of Confidential Computing.

Confidential ComputingRegulatory ComplianceData integrity

The financial services industry has the highest percentage of full production deployments of Confidential Computing at 37%, followed by healthcare at 29% and government at 21%.

Confidential ComputingHealthcareFinancial Services

84% of organizations identify attestation validation as a significant adoption challenge for Confidential Computing.

Confidential ComputingConfidential Computing Adoption ChallengeData Security

75% of organizations globally are adopting Confidential Computing.

Confidential ComputingData SecurityConfidential Computing Adoption