Fortanix Confidential Data Search supports scalable searches in encrypted databases with sensitive data, without compromising data security or privacy regulations. Credit: iStock Cloud data security company Fortanix has announced Fortanix Confidential Data Search, a search offering for encrypted databases within enterprise cloud workflows. "Confidential Data Search allows data analysts to use off-the-shelf, unmodified databases in a standard, unrestricted SQL environment," said Richard Searle, vice president of Confidential Computing, Fortanix. "Users do not need to convert their datasets to new complex proprietary database formats or deploy proprietary agents." The search capability, Fortanix claims, doesn't compromise data security or privacy regulations as it supports a range of regulatory compliance controls. The offering will be available for early trials in the second half of 2023, as part of Fortanix's data security manager (DSM) SaaS. Confidential and unrestricted search Fortanix Confidential Data Search is powered by the company's in-house confidential computing technology, a data security method that uses runtime encryption and secures the encryption keys inside of a secure enclave such as Intel SGX, AMD SEV-SNP and AWS Nitro Enclaves. The offering, Fortanix claims, will allow data analysts to use unmodified databases, using a standard SQL environment that is universally familiar, enabling them to retrieve more accurate results, faster. There's no need to convert databases to complex formats, like existing solutions, or deploy proprietary agents. "The solution uses proven encryption standards for increased trustworthiness, including readiness for post-quantum cryptography (PQC)," Searle said. The new data search capability uses commodity databases and hardware. Fortanix provides secure trusted execution environments (TEEs) as a cloud service, enabling customers to pay based only on usage. The Confidential Data Search ensures query issuer and data owner confidentiality, allowing execution of arbitrary SQL queries without significant system latency. Legacy solutions introduce complexity Fortanix's new offering is targeted at reducing the complexity that comes with the existing data-searching solutions on the market. Almost all the existing solutions use heavy (expensive and complex) cryptographic technologies, according to Fortanix. "Current solutions that enable secure searches of encrypted data are predominantly based on complex and expensive cryptographic technologies, which are impractical for data-mining complex medical or financial datasets," Searle said. "Such computationally intensive approaches can be 1,000 to 1,000,000 times slower than standard non-encrypted databases and often require customized hardware to alleviate the delay." The existing technologies, also called homomorphic encryption, restrict search parameters' scope, making only numerical searches possible. These technologies may also require additional solutions to validate different levels of access mandated by data regulations. Fortanix's offering, however, supports data analysis across different geographies which require varying regulatory and compliance controls such as HIPAA, GDPR, FINMA, PCI-DSS, etc. Fortanix will be showcasing the new offering at the 2023 Confidential Computing Summit at the San Francisco Marriot Marquis on June 29. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe