There is tremendous opportunity for application and solution developers to take charge of their data security using new hardware-based controls for cloud and enterprise environments. Intel® Software Guard Extensions (Intel® SGX)1 2 offers hardware-based memory encryption that isolates specific application code and data in memory. Intel® SGX allows user-level code to allocate private regions of memory, called enclaves, which are designed to be protected from processes running at higher privilege levels. Only Intel® SGX offers such a granular level of control and protection.
See how Fortanix* Runtime Encryption Capsule (REC), a trusted execution environment, allows workloads to use Intel® SGX enclaves for their cryptographic protection from rouge insiders, compromised OS, malware, and other vulnerabilities.
Microsoft shares the work it is doing with Intel to make cloud offerings more secure. Microsoft Azure* Confidential Computing now features hardware-based security with Intel® SGX, which helps protect data while it is in-use, in-memory.
Join Jennifer Huffstetler, VP and GM for Data Center Product Management at Intel, as she hosts a roundtable discussion with industry leaders on security. Learn how Fortanix, Microsoft, and R3 are using Intel® Xeon® E processors with Intel® SGX to enhance protection for their customer’s most sensitive data and applications.
Intel® Xeon® E processors provide advanced security capabilities that can be used in concert with existing infrastructure, to enhance, and protect the most sensitive portions of a workload or service. Featuring enhanced Intel® Software Guard Extensions (Intel® SGX), Intel® Xeon® E processors can partition applications into processor-hardened enclaves, to enhance protection of selected applications or data from disclosure or modification.
No product or component can be absolutely secure.
Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://www.intel.com.