Together, remote attestation, encrypted interaction, and memory isolation provide all the things which is needed to increase a confidential-computing ecosystem from a CVM or a secure enclave to a GPU.
Azure https://nicolepcfw039778.thenerdsblog.com/36021024/a-review-of-anti-ransomware-software-for-business