McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.
Graphic shows how Intel® Trusted Execution Technology verifies system BIOS and firmware, matches hypervisor measure, and then launches OS and apps.
View a graphic representation of hardware-based Intel® Trusted Execution Technology, which verifies system BIOS and firmware, matches hypervisor measure, and then blocks or launches the operating system and applications.
Intel IT is moving to a cloud-computing environment, with new security challenges. We evaluated Intel® Trusted Execution Technology (Intel® TXT), a technology in Intel® processors that enables hardware-enforced integrity checks at server startup.
Video reporting key findings of cloud security issues research with 200 IT managers.
Video reporting key findings from cloud security issues research with 200 IT managers. Includes how security influences cloud implementation.Full View >
Technology Brief: Describes reference architecture for a cloud setup using Enomaly ECP* to enhance platform security on Dell PowerEdge* servers.
Technology Brief: Describes reference architecture for a private cloud setup using Enomaly Elastic Computing Platform* to enhance cloud platform security on Intel®-based Dell PowerEdge* servers.
Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.Full View >