Three Critical Use Cases for Privacy-Enhancing Computation Techniques
Curious about which applications of Privacy-Enhancing Computation (PEC) techniques will create the most impact? According to Gartner®, security and risk management leaders can manage constraints while respecting individual privacy by applying PEC techniques in AI modeling, cross-border data transfers, and data analytics.
Additional perspectives in the “Three Critical Use Cases for Privacy-Enhancing Computation Techniques.”
According to Gartner®, “By 2025, 60% of large organizations will adopt PEC for processing data in untrusted environments and multiparty data analytics use cases.” This report describes three key use cases including AI model training and sharing, public cloud platform usage amid data residency restrictions, and internal/external analytics activities.
Join the next generation of leaders who focus on data privacy, technological innovation, and information and resilience risk management by downloading a complimentary copy of the Gartner® report.
Gartner, Three Critical Use Cases for Privacy-Enhancing Computation Techniques, Bart Willemsen, David Mahdi, 28 June 2021.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.