Conservative estimates suggest that by 2015, 10 billion computing devices—laptops, smartphones, and handheld retail devices—will be connected to each other through the global Web. As dependency on computing devices grows and businesses become more technology-savvy, security threats have become increasingly more advanced.
Establishing a root of trust
Intel is collaborating with leading security solution providers to increase security by establishing a hardware root of trust—the use of Intel® Trusted Execution Technology (Intel® TXT)—from which virtualization security management software can get accurate information about any platform and its operating environment.1 The goal is to present a unified, policy-based assessment of an organization’s security and compliance posture using a central dashboard.
This approach will provide unprecedented visibility into actual conditions within the bottommost layers of the cloud, where protecting a company’s data and assets becomes more of a challenge.
Embedded technology enhances security from the server to the cloud and back
As an IT manager, you need to be confident that an infrastructure is trustworthy before making any migration. Embedded security technologies in Intel® Xeon® processors perform regular integrity checks to validate the behavior of key client system components at startup. This helps prevent threats, and also establishes a root of trust to create a protected, measured launch environment.2 3
- Intel® Advanced Encryption Standard-New Instructions (Intel® AES-NI) accelerates data encryption in Intel Xeon processors by implementing part of the security algorithm in the hardware to make pervasive encryption a performance reality.4
- Video : Boost Cloud Security with Intel Advanced Encryption Standard-New Instructions >
- Protecting network data without performance tradeoffs >
- Intel® Trusted Execution Technology (Intel® TXT) provides a processor-based enforcement point to check for malicious software on server platforms by analyzing the consistency in behaviors and launch-time configurations.1
- Intel® Virtualization Technology (Intel® VT), together with Intel TXT, complements virtualization acceleration and VM isolation functions to help protect the integrity and confidentiality of workloads in virtualized environments.5
- Boost server security >
Protect the network from below the OS
Today’s rapidly changing business landscape is taking PC security challenges to a new level. Identity theft is a growing concern, as IT staff and employees continually share passwords to perform their jobs. The influx of viruses and the explosion of malware, including devastating, difficult-to-detect rootkits, is also a consistent security challenge. Moreover, the evolution of cloud computing, while advantageous to IT managers, also presents its own unique set of security risks.
Together, Intel Trusted Execution Technology and Intel Virtualization Technology work constantly to deliver extensive, automatic “blanket” protection that defends against escalation of privilege and other sophisticated attacks and prevents viruses from taking hold deep within your system.1 5 6
Comprehensive, multi-layered, embedded security for PCs
Intel® Core™ vPro™ processors with embedded security capabilities help manage security threats, protect identification and confidential data, control access points, and enable remote management and repair.2