Trusted Compute Pools with Intel® Trusted Execution Technology (Intel® TXT)
Enhance your server platform security
Hardware-based technology for enhancing platform security
Trusted compute pools with Intel® Trusted Execution Technology (Intel® TXT)1 support IT compliance by protecting virtualized data centers’ private, public, and hybrid clouds against attacks toward hypervisor and BIOS, firmware, and other pre-launch software components.
A feature of the Intel® Xeon® processor, Intel TXT establishes a root of trust through measurements when the hardware and pre-launch software components are in a known good state. Utilizing the result, administrators can set policies for sensitive data and workload placement onto groups of servers known as trusted compute pools.
Validating key component behavior at startup
Why it matters
With Intel TXT, you can:
- Run your workload and data on a trusted server.
- Protect your workload and data.
- Avoid compromising security in the cloud.
- Enhance IT compliance.
Intel TXT works in conjunction with server systems based on the Intel Xeon processor and software stack installed on top of the server systems.
See solutions and products incorporating Intel TXT from key industry leaders.

Available on eBook and paperback
Intel® Trusted Execution Technology for Server Platforms
This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter managers.
Book authors:
William Futral, James Greene
Available on: Amazon, Apress, Barnes and Noble

Available on eBook and paperback
Building the Infrastructure for Cloud Security
A comprehensive look at the various facets of cloud security—infrastructure, network, services, compliance, and users.
Book authors:
Raghuram Yeluri, Enrique Castro-Leon
Available on: Amazon, Apress, Barnes and Noble
Industrial and transaction systems
Imagine a piece of manufacturing or retail equipment becoming compromised—possibly manipulated via network, USB flash drive, or an illegal peripheral at boot time. Intel TXT measures and detects these and other manipulations. Using such measurements, systems can be kept from booting.
Visit the Intel® Embedded Design Center to get additional developer-level details and view more industrial automation and retail technology solutions.
Have questions? Contact us >
Discover more Intel® technologies
Learn how Intel® technologies optimize intelligent systems design >
Intel® TXT white paper
Intel® Trusted Execution Technology provides highly scalable platform security in physical and virtual infrastructures.
Read more >
Server platforms matrix
Intel® TXT server platforms support matrix >
See how it works
Shows how Intel® Trusted Execution Technology verifies system BIOS and firmware and launches the OS.
Enlarge >
Intel® Embedded Design Center
Resources for intelligent systems developers >
Conversations
1. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules, and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.



