The Intel® Xeon® Scalable platform delivers an essential, hardware-based root-of-trust environment. Protection extends up from the silicon, through the platform hardware and firmware, ensuring an effective IT security platform.
Intel® technology enables Trusted Infrastructure through a suite of platform security technologies built into Intel® silicon. Hardware-based security technologies provide a critical foundation for secure IT. They address the numerous, increasing, and evolving security threats across physical and virtual infrastructures.
As more devices connect to the Internet and workloads move to the cloud, hacking is a greater threat than ever. Traditional schemes against known-bad elements are not enough to keep the enterprise secured. Instead, the entire IT infrastructure must be secure, starting from the root with platform silicon.
Trusted Infrastructure relies on hardware-based security built directly into the foundation of the platform, Intel® Xeon® Scalable processors. It is part of a suite of solutions that includes: Intel® Cloud Integrity Technology (Intel® CIT), Intel® Trusted Execution Technology (Intel® TXT) with One-Touch Activation, and Intel® Platform Trust Technology (Intel® PTT).1
Leading industry solutions providers share access to publications, reference architectures, white papers, solutions briefs, and more.
Use Intel® CIT to manage the integrity of virtualized and non-virtualized Intel-IA based platforms.
Purchase a server from the OEM/ODM with a discrete Trusted Platform Module (TPM) chip or integrated Intel® PTT, enabled directly on their platform.
Solutions and products for Intel® TXT are available from leading server systems providers as well as software and services providers.
Learn how hardware-based security technologies help address increasing and evolving security threats.
Learn how to build a trusted cloud infrastructure.
Get complete background and step-by-step procedures with the Intel® TXT configuration guide.
SoftLayer simplifies a cloud environment that measures, monitors, and verifies the security and integrity of the entire system.
Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://www.intel.co.uk.