The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

Enhanced Enterprise Security to Address Key Infrastructure and Regulatory Challenges

While security has always been a top priority, enterprise security has become especially crucial in today’s evolving IT and cloud computing technology landscapes.

Data today travels across unknown cloud environments, and mobile users roam outside the corporate firewall, which is why the Intel® Xeon® processor E5 family and the Intel Xeon processor E7 family provide new levels of hardware-based enterprise security capabilities. To bolster cloud and enterprise security and deliver secure transactions from the data center out, Intel® processor features include:

  • Increased infrastructure protection. Intel® Platform Protection Technology with Intel® Trusted Execution Technology (Intel® TXT)1 evaluates software component integrity and provides a hardware-based root of trust for enhanced security against malicious software attacks that occur before the virtual machine manager boots. Intel TXT also allows platform integrity status to be reported into management software, providing visibility and a powerful control point for managing the security of virtualized workloads.
  • Pervasive encryption. Intel® Data Protection Technology with Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)2 strengthens data protection with built-in capabilities that dramatically reduce the security performance tax on your systems. Intel AES-NI enable fast, secure data decryption and encryption that are up to 10 times faster than previous-generation software encryption technology.34 Intel Data Protection Technology with Intel® Secure Key2 provides additional data protection by generating high-quality keys for cryptographic protocols.
  • More secure virtualization. Intel® Virtualization Technology (Intel® VT)5 enhances cloud infrastructure security by providing hardware-based isolation of virtualized workloads that are sharing a common set of hardware platform resources such as memory or I/O—giving the desired isolation of data and workloads.
  • Improved protection against malicious attacks. Additional hardware-assisted capabilities protect against malware, denial-of-service (DoS) attacks, and surface plane attacks with Intel Platform Protection Technology with BIOS Guard, Intel® OS Guard, and Execute Disable Bit1.

The advanced security innovation built into Intel TXT and Intel AES-NI delivers hardware-based capabilities to meet the needs of enterprises and enhance security in the cloud. In addition, users can ease cloud adoption with Intel’s application security solutions including Intel® Expressway API Manager.

Product and Performance Information

1

No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, firmware, software, may require a subscription with a capable service provider (may not be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more information, visit http://www.intel.com/go/anti-theft. Consult your system manufacturer and/or software vendor for more information.

2

No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, and firmware and software optimized to use the technologies. Consult your system manufacturer and software vendor for more information.

3

Source: testing with Oracle Database Enterprise Edition 11.2.0.2 with Transparent Data Encryption (TDE) AES-256 shows as much as a 10x speedup when inserting one million rows 30 times into an empty table on the Intel® Xeon® processor X5680 (3.33 GHz, 36 MB RAM) using Intel IPP routines, compared to the Intel® Xeon® processor X5560 (2.93 GHz, 36 MB RAM) without Intel IPP.

4

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance.

Results have been measured by Intel based on software, benchmark or other data of third parties and are provided for informational purposes only.  Any difference in system hardware or software design or configuration may affect actual performance.  Intel does not control or audit the design or implementation of third party data referenced in this document.  Intel encourages all of its customers to visit the websites of the referenced third parties or other sources to confirm whether the referenced data is accurate and reflects performance of systems available for purchase.

5

Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.