Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.
Explore how Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers that mitigates the risks of moving sensitive information and applications to our private cloud.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.
A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models: cryptography for data protection, identity and access management, service gateways, and trusted compute pools.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Cloud security issues research video.
Using Intel® AES-NI in cloud reduces code size, execution cycles, vulnerability to attack while boosting performance.
Enhancing server and cloud security with Intel® Trusted Execution Technology
Parallels discusses building a cloud with Trusted Compute Pools