Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intel username or password?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Russia (Русский)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. New Cybersecurity and Threat Detection Tools, IDC

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

IDC Perspective: Intel Provides New Tools to the Cybersecurity Task

Download the paper

The Results Could be Game Changing

Software companies and device manufacturers can leverage Intel® Threat Detection Technology’s (TDT) security-level telemetry to play an active role against “above the OS'' attacks such as ransomware and cryptomining.
  • Adoption of Intel TDT could lead to a measurable difference in security efficacy between Intel-based systems and the systems based on other processor vendors.
  • Intel's Accelerated Memory Scanning feature dropped CPU utilization from 20% to as little as 2% for memory scanning use cases.
  • The selection and procurement of PC’s and server systems have a long-term, measurable impact on the security posture of an organization.

Get the Paper

IDC discusses how Intel is unlocking capabilities in its system on a chip (SoC) that fundamentally change the ability of security vendors to implement security.

Download the paper ›

Discover the IDC’s Key Findings

  • The goal of the Intel Security vendor partnership is to enable and empower the Intel-based systems of today and tomorrow to be fundamentally more secure and have lower malware infection rates than AMD, Apple and other ARM-based processor systems.
  • Intel TDT has different capabilities, and most are backward-compatible to sixth-generation Skylake processors. The Tiger Lake generation adds new multidetector capabilities and performance increases.
  • Adoption could lead to a measurable difference is security efficacy between Intel-based systems and the systems based on other processor vendors.

“The features provided by Intel enable a demonstrable improvement to security.”

“PMU (Performance Monitoring Unit) for detection...does not have the same potential impact of leveraging graphics processing units (GPUs) in Intel processors. Applying GPUs to security use cases can be game changing, in IDC's opinion.”

“The ‘handcuffs’ can be removed from security providers as to the complexity of detection algorithms used. Models that were too complex and violated the upper limit of the 2% cap can now be leveraged.”

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo