White Paper: Describes family of highly optimized implementations of the SHA512 cryptographic hash algorithm on Intel® processors. (v.1, Nov. 2012)
White Paper: Describes a family of highly optimized implementations of the SHA512 cryptographic hash algorithm, which provide industry leading performance on a range of Intel® processors. (v.1, Nov. 2012)
Intel speeds security software and makes it stronger by building tools right into the silicon to protect enterprise data and increase efficiency.
Case Study: Tier 3 uses Intel® Advanced Encryption Standard New Instructions for companies to cost-effectively expand security in customers’ cloud.
Case Study: Cloud software provider Tier 3 utilizes Intel® Advanced Encryption Standard New Instructions to help organizations expand into the cloud securely while keeping expenses and overhead low.
Solution Brief: Strengthen your mobile device security with hardware-enhanced protections on devices powered by Intel® processors with Windows 8.1*."
Solution Brief: With Windows 8.1*, whether you use traditional or mobile management solutions, hardware-assisted device security from Intel helps you block stealthy malware and secure your company’s data with the efficiency and speed users demand.