Follow these four steps to activate your Intel® Trusted Execution Technology (Intel® TXT) and explore useful resources to get the most from this trusted security solution.
Addresses the evolving security threats across physical and virtual infrastructure and the advantages of a highly scalable architecture like Intel® Trusted Execution Technology, a hardware-based technology for enhancing server platform security.
Vendor matrix lists server platform components and operating environments that support Intel® Trusted Execution Technology, including platform availability and additional requirements.
Information on how Intel® Trusted Execution Technology can be enabled within a variety of situations and the benefits of each, with links to resources for additional help.
اطلع على قائمة بموفري المنتجات والحلول، مثل Red Hat وVMware وغيرهم ممن يدمج حاليًا تقنية التنفيذ الموثوق Intel® Trusted Execution لتوفير مستوى إضافي من الثقة والأمان.
Case Study: DuPont builds private, high-performance cloud infrastructure using Intel® Trusted Execution Technology to support growth in modeling, simulation informatics, and analytics, while increasing data center security and compliance.
Product Guide: Describes Intel® Platform Trust Enabler (Intel® PTE) 2.0, and shows high-level solution architecture, deployment topology, and execution flow, as well as the steps for installation and configuration, user guide, and more.
Discusses how Intel® Trusted Execution Technology uses data verification to ensure a system is in a trusted configuration on every boot, protecting high security environments. (v.001, Dec. 2010)