The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
Intel arms your software with the visibility and tools, like Intel® Trusted Execution Technology, it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Hardware-based verification and authentication helps guard identities without slowing productivity.
Working with companies to make security software that is enhanced by hardware.
Securing the Cloud with Intel® TXT Usage Models
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
Trusted compute pools with Intel® TXT