Intel®-based technologies can support the need for compliance with the HIPAA privacy and security rule and other local regulation of healthcare information.
Follow these four steps to activate your Intel® Trusted Execution Technology (Intel® TXT) and explore useful resources to get the most from this trusted security solution.
Product Brief: Intel® Xeon® Processor E3-1200 Family gives you smarter control of the things that matter to your business.
Addresses the evolving security threats across physical and virtual infrastructure and the advantages of a highly scalable architecture like Intel® Trusted Execution Technology, a hardware-based technology for enhancing server platform security.
Vendor matrix lists server platform components and operating environments that support Intel® Trusted Execution Technology, including platform availability and additional requirements.
Intel® AES-NI improves on the previous Advanced Encryption Standard (AES) algorithm, accelerating data encryption on the Intel® Xeon® processor family and 2nd generation Intel® Core™ processor family.
Discusses the privacy and security concerns of healthcare workarounds, such as using unapproved consumer applications, and how to improve health information exchanges and BYOD policies to promote secure coworker collaboration.
Information on how Intel® Trusted Execution Technology can be enabled within a variety of situations and the benefits of each, with links to resources for additional help.