Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel® Security Engines

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel® Security Engines Enhance Data Security to Drive Innovation

Put sensitive data to work while preserving confidentiality and integrity with the integrated security features in Intel® Xeon® Scalable processors.1

Get More Value from Your Data Without Compromising Security

Intel® Security Engines, built into Intel® Xeon® Scalable processors, deliver enhanced security capabilities that allow for even the most sensitive data to be available for AI analysis, training, or processing—all while remaining private and confidential.

Whether you’re working in the cloud, at the edge, or on-premises, Intel® Security Engines help you extract the most value from sensitive or regulated data.

Read the Security Accelerated product brief

Achieve Rigorous Security for Your Artificial Intelligence Initiatives

Our integrated security features help you overcome evolving security challenges so you can put more of your data into action with confidence.

Reduce Attack Risks and Strengthen Your Threat Response

Achieve robust threat prevention and improve your ability to respond to threats if they occur, with the advanced capabilities of Intel® Security Engines.

Control Who Accesses and Sees Sensitive Data

Strengthen compliance and keep your important data protected. Intel® Security Engines enable high levels of cryptographic security with enhanced access control—so only those who are authorized can see and work with your data.

Add Layers of Protection between Your Data and Threats

Make it as difficult as possible for adversaries to access, steal, or corrupt your data. With Intel® Security Engines, you can isolate your data into secure enclaves to help protect it from threats, attacks, and harm.

Protect Your Platform from the Ground Up

Enhance your security measures to mitigate specialized attacks at the firmware level that enable hijackers to gain control over your system. Intel® Security Engines feature security built in at the silicon level to protect all layers of systems.

Show more Show less

Explore Integrated Intel® Security Engines

Intel® Security Engines include several integrated security features working in concert to help you boost the protection of confidential data, preserve code integrity, and maintain the high level of performance needed for your demanding workloads.

Workload Acceleration: Data-Handling Efficiency

Cryptographic Security

Intel® Crypto Acceleration

Enable high levels of cryptographic security, enhanced performance, and a more seamless user experience.

  

Learn how Intel® Crypto Acceleration works

  

Data Encryption and Compression

Intel® QuickAssist Technology (Intel® QAT)

Expedite the encryption and decryption of data to help reduce system resource consumption for your AI workloads.

  

Learn how Intel®QAT works

  

Explore business outcomes and how to get started

  

Confidential Computing: Enhanced Protection and Privacy for Data in Use

Application Isolation

Intel® Software Guard Extensions (Intel® SGX)

Protect and isolate your confidential data while it is actively in use. Intel® SGX, our unique application isolation technology, is one of two solutions that enable confidential computing.

  

Learn how Intel® SGX works

  

VM Isolation and Protection

Intel® Trust Domain Extensions (Intel® TDX)

Increase confidentiality, enhance privacy, and gain control over your data at the VM level. Intel® TDX, our unique VM isolation technology, is one of two solutions that enable confidential computing.

  

Learn how Intel® TDX works

  

Advanced Protection: Defenses Positioned throughout the Stack

Safe Software Behavior

Intel® Control-flow Enforcement Technology (Intel® CET)

Improve protection against control-flow hijacking—a class of malware that is difficult to defend.

  

Learn how Intel® CET works

  

Platform Integrity

Intel® Platform Firmware Resilience (Intel® PFR)

Increase the protection of various platform firmware components from Permanent Denial of Service attacks.

  

Learn how Intel® PFR works

  

  

See How Others Drive Innovation with Intel® Security Engines

Nationwide Building Society Boosts User Experience

University of Pennsylvania Improves Accuracy of Brain Tumor Detection by up to 33%2

Video: Bosch Overcomes Regulated Data Security Obstacles for ADAS Development

Show more Show less

Browse Intel® Xeon® Scalable Processors

Find the processor that meets your needs—Intel® Security Engines integrated on all.

Support Today’s Most Critical Workloads with Intel® Accelerator Engines

Intel® Xeon® Scalable processors provide six integrated accelerator engines,1 purpose-built to support today’s most challenging workloads, including AI, HPC, security, networking, analytics, and storage. Learn how you can maximize efficiency and performance while reducing costs and energy consumption, using these integrated features.

View all Intel® Accelerator Engines

Intel® AI Engines

Intel® HPC Engines

Intel® Security Engines

Intel® Network Engines

Intel® Analytics Engines

Intel® Storage Engines

Product and Performance Information

1

Availability of accelerators varies depending on SKU. Visit the Intel Product Specifications page for additional product details.

2

Sarthak Pati, et al., “Federated Learning Enables Big Data for Rare Cancer Boundary Detection,” arXiv, https://arxiv.org/abs/2204.10836.

  • Overview
  • Product Information
  • Customer Stories
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo