Create a Silicon-based Trusted Infrastructure

The Intel® Xeon® Scalable platform delivers an essential, hardware-based root-of-trust environment. Protection extends up from the silicon, through the platform hardware and firmware, ensuring an effective IT security platform.

Ensure Trust, Resilience, and Control

Intel® technology enables Trusted Infrastructure through a suite of platform security technologies built into Intel® silicon. Hardware-based security technologies provide a critical foundation for secure IT. They address the numerous, increasing, and evolving security threats across physical and virtual infrastructures.

The Attack Surface Is Expanding

As more devices connect to the Internet and workloads move to the cloud, hacking is a greater threat than ever. Traditional schemes against known-bad elements are not enough to keep the enterprise secured. Instead, the entire IT infrastructure must be secure, starting from the root with platform silicon.

Deploy a Comprehensive Solution

Trusted Infrastructure relies on hardware-based security built directly into the foundation of the platform, Intel® Xeon® Scalable processors. It is part of a suite of solutions that includes: Intel® Cloud Integrity Technology (Intel® CIT), Intel® Trusted Execution Technology (Intel® TXT) with One-Touch Activation, and Intel® Platform Trust Technology (Intel® PTT).

Intel® CIT—Create Trusted Compute Pools

Intel® Cloud Integrity Technology

Ensure cloud applications run on trusted, unaltered servers and virtual machines.  Provides attestation for integrity and compliance across compute pools in the cloud, made possible with an established root-of-trust.

Intel® TXT—Secure the Platform

Intel® Trusted Execution Technology

Provide the necessary underpinnings to evaluate the computing platform and its security. Now with One-Touch Activation, it’s easier than ever to deploy.

Intel® PTT—Protect Encryption Keys

Intel® Platform Trust Technology

Secure encryption keys in a Trusted Platform Module (TPM) integrated directly into the chipset.

Get Started with Intel® TXT

Leading industry solutions providers share access to publications, reference architectures, white papers, solutions briefs, and more.

Join now

Use Intel® CIT to manage the integrity of virtualized and non-virtualized Intel-IA based platforms.

Learn how

Purchase a server from the OEM/ODM with a discrete Trusted Platform Module (TPM) chip or integrated Intel® PTT, enabled directly on their platform.

Start here

Solutions and products for Intel® TXT are available from leading server systems providers as well as software and services providers.

Find out more

Take Advantage of These Helpful Resources

Learn how hardware-based security technologies help address increasing and evolving security threats.

Read the white paper

Learn how to build a trusted cloud infrastructure.

Read the white paper

Get complete background and step-by-step procedures with the Intel® TXT Configuration Guide.

Read the white paper

SoftLayer simplifies a cloud environment that measures, monitors, and verifies the security and integrity of the entire system.

Read the white paper