Preview Mode Links will not work in preview mode

Oct 12, 2022

Lift and shift your confidential VM and container workloads to the cloud —without code changes— for higher levels of data protection. When combined with Azure's stringent attestation measurements, Zero Trust security and confidential computing provide the latest silicon level advances. See your options for data encryption and isolation, starting with the virtual machine layer, to containers running in the encrypted VM, and ultimately Azure Container Instances.

From the Azure confidential computing team, Michael McReynolds joins Jeremy Chapman to show how this collectively compares to other options, such as encryption, using application enclaves.

00:00 - Introduction
01:24 - Options for implementing confidential computing
03:12 - Types of attacks to protect against
04:00 - Confidential VM protections
05:56 - How to create Confidential VMs
08:01 - Container-based architecture advantages
09:38 - Azure Container Instances
11:23 - Wrap up

► Link References:
More information on Azure confidential computing at

Sign up to preview confidential containers on ACI at

Get tools for generating attestation reports at

Watch our migration series at

► Unfamiliar with Microsoft Mechanics?
As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft.

• Subscribe to our YouTube:

• Talk with other IT Pros, join us on the Microsoft Tech Community:

• Watch or listen from anywhere, subscribe to our podcast:

• To get the newest tech for IT in your inbox, subscribe to our newsletter:

► Keep getting this insider knowledge, join us on social:
• Follow us on Twitter:

• Share knowledge on LinkedIn:

• Enjoy us on Instagram:

• Loosen up with us on TikTok: