Share with Colleagues
No computer system can provide absolute security under all conditions. Intel TXT requires a computer system with Intel Virtualization Technology,
an Intel TXT–enabled processor, chipset, BIOS, Authenticated Code Modules, and an Intel TXT–compatible measured launched environment (MLE).
Intel TXT also requires the system to contain a TPM v1.s. For more information, visit intel.com/content/www/us/en/data-security/security-
This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING
OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to
use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.
Copyright © 2011 Intel Corporation. All rights reserved.
Intel, the Intel logo, Xeon, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel Corporation in the U.S. and/
or other countries.
*Other names and brands may be claimed as the property of others.
Microsoft and SharePoint are registered trademarks of Microsoft Corporation in the United States and/or other countries.
Sponsors of Tomorrow.™