Enterprise Multi-Level Security
Embedded security for a more connected world
Conservative estimates suggest that by 2015, 10 billion computing devices—laptops, smartphones, and handheld retail devices—will be connected to each other through the global Web. As dependency on computing devices grows and businesses become more technology-savvy, security threats have become increasingly more advanced.
Establishing a root of trust
Intel is collaborating with leading security solution providers to increase security by establishing a hardware root of trust—the use of Intel® Trusted Execution Technology (Intel® TXT)—from which virtualization security management software can get accurate information about any platform and its operating environment.1 The goal is to present a unified, policy-based assessment of an organization’s security and compliance posture using a central dashboard.
This approach will provide unprecedented visibility into actual conditions within the bottommost layers of the cloud, where protecting a company’s data and assets becomes more of a challenge.
Embedded technology enhances security from the server to the cloud and back
As an IT manager, you need to be confident that an infrastructure is trustworthy before making any migration. Embedded security technologies in Intel® Xeon® processors perform regular integrity checks to validate the behavior of key client system components at startup. This helps prevent threats, and also establishes a root of trust to create a protected, measured launch environment.2 3
- Intel® Advanced Encryption Standard-New Instructions (Intel® AES-NI) accelerates data encryption in Intel Xeon processors by implementing part of the security algorithm in the hardware to make pervasive encryption a performance reality.4
- Video : Boost Cloud Security with Intel Advanced Encryption Standard-New Instructions >
- Protecting network data without performance tradeoffs >
- Intel® Trusted Execution Technology (Intel® TXT) provides a processor-based enforcement point to check for malicious software on server platforms by analyzing the consistency in behaviors and launch-time configurations.1
- Intel® Virtualization Technology (Intel® VT), together with Intel TXT, complements virtualization acceleration and VM isolation functions to help protect the integrity and confidentiality of workloads in virtualized environments.5
- Boost server security >
Protect the network from below the OS
Today’s rapidly changing business landscape is taking PC security challenges to a new level. Identity theft is a growing concern, as IT staff and employees continually share passwords to perform their jobs. The influx of viruses and the explosion of malware, including devastating, difficult-to-detect rootkits, is also a consistent security challenge. Moreover, the evolution of cloud computing, while advantageous to IT managers, also presents its own unique set of security risks.
Together, Intel Trusted Execution Technology and Intel Virtualization Technology work constantly to deliver extensive, automatic “blanket” protection that defends against escalation of privilege and other sophisticated attacks and prevents viruses from taking hold deep within your system.1 5 6
Comprehensive, multi-layered, embedded security for PCs
Intel® CoreTM vProTM processors with embedded security capabilities help manage security threats, protect identification and confidential data, control access points, and enable remote management and repair.2
1. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. For more information, see www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.
2. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.
3. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details. For more information, see http://www.intel.com/content/www/us/en/security/security-at-home.html.
4. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
5. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.
6. No system can provide absolute security. Requires an Intel® OS Guard-enabled platform, available on select Intel processors, and an enabled operating system. Consult your system manufacturer for more information.