The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:
• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to the cloud while keeping sensitive back-end database servers secure in your data center.
Parallels discusses building a cloud with Trusted Compute Pools
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
HyTrust discusses building a secure cloud computing solution.