Intel®-based technologies can support the need for compliance with the HIPAA privacy and security rule and other local regulation of healthcare information.
Follow these four steps to activate your Intel® Trusted Execution Technology (Intel® TXT) and explore useful resources to get the most from this trusted security solution.
Product Brief: Intel® Xeon® Processor E3-1200 Family gives you smarter control of the things that matter to your business.
Addresses the evolving security threats across physical and virtual infrastructure and the advantages of a highly scalable architecture like Intel® Trusted Execution Technology, a hardware-based technology for enhancing server platform security.
Intel’s Jeffrey Rott presents an in-depth look at Intel® Advanced Encryption Standard New Instructions for the 2010 Intel® Core™ processor family and performance and security improvements.
Vendor matrix lists server platform components and operating environments that support Intel® Trusted Execution Technology, including platform availability and additional requirements.
Intel® AES-NI improves on the previous Advanced Encryption Standard (AES) algorithm, accelerating data encryption on the Intel® Xeon® processor family and 2nd generation Intel® Core™ processor family.
Guide explains how to set up and deploy a trusted cloud solution on bare-metal servers, using elements from Intel, IBM Cloud SoftLayer*, VMware, and HyTrust, helping to create a chain of trust from hardware through hypervisor and management apps.
See how Intel® Wireless Docking makes a better way to work by letting you quickly connect your 6th generation Intel® Core™ processor-based device to a monitor, mouse, network, and other peripherals without any wires.Full View >
Find a better way to work with 6th generation Intel® Core™ processors that help make the small changes such as improving productivity that lead to increased effectiveness of mobile workers and improved collaboration throughout the organization.Full View >