Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel® Software Guard Extensions (Intel® SGX)

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel® Software Guard Extensions (Intel® SGX)

Learn how to enhance your security protections, increase data privacy, and improve confidentiality with Intel® SGX—the most researched and updated confidential computing technology on the market today.

Reduce the Attack Surface Around Your Data to Unlock New Opportunities

New opportunities abound for businesses that can harness the power of the cloud and data for new services, collaboration, and analysis. For security-conscious organizations, placing private, sensitive, or regulated data outside of a secure physical location can be considered too risky.

Intel® SGX is part of the Intel® confidential computing technology portfolio that allows businesses to take advantage of the cloud while staying in control of their data. Intel® SGX protects data actively being used in the processor and memory by creating a trusted execution environment (TEE) called an enclave. Users can scale the amount of trusted code inside an enclave from an entire application with thousands of lines of code to a single function with just few dozen, minimizing the attack surface and access to sensitive data. This level of application isolation is only available for the data center through Intel® SGX.

Creates the Smallest Trust Boundary Available

Intel® SGX currently provides the smallest trust boundary in the data center compared to other confidential computing technologies. With Intel® SGX, only the code or functions inside the protected enclave can access confidential data. Other software in the virtual machine, cloud tenants, the cloud stack, and admins are not allowed access.

Protects Data Everywhere It May Be Exposed

Intel® SGX is designed to protect data in use with isolation, encryption, and attestation capabilities to help guard against threats while also allowing users to maintain control of and use of their data.

Strengthens Enclave Trust and Boosts User Confidence

Through remote attestation, Intel® SGX allows users to verify that an enclave is truly an Intel® SGX enclave—and that it’s using the latest security updates and information—before any data is shared.

Show more Show less

Looking for Information on Virtual Machine Isolation?


Intel® Trust Domain Extensions (Intel® TDX) is the newest Intel® confidential computing technology that enables isolation at the virtual machine level, usually with few or no application code changes.

Explore Intel® TDX

See the Capabilities You Can Gain with Intel® SGX

By providing an extra layer of defense and reducing the attack surface, you can use Intel® SGX to open up your data silos and fuel innovation, collaboration, and new and exciting use cases while remaining protected and compliant.

Confidential AI and Analytics

Training and inferencing AI models with sensitive, confidential, or regulated data require an enhanced level of protection. Intel® SGX not only helps keep data confidential, but it also helps shield proprietary models and software IP from theft or modification.

Learn more

Sovereign Data and Compliance

International companies are affected by data privacy, sovereignty, and geolocation regulations that can vary from country to country. Intel® SGX is designed to help them stay compliant and in control by giving only authorized users or verified software access.

Learn more

More-Confident Collaboration

Pool data across departments, businesses, and even countries across the globe for multiparty analysis while preserving data confidentiality between parties with the granular level of isolation capabilities offered by Intel® SGX.

Learn more

Show more Show less

Discover the Intel® Confidential Computing Portfolio

Our confidential computing portfolio offers three security technologies to meet the unique needs and regulatory requirements of businesses of all sizes across industries. With application isolation, VM isolation, and operator-independent, multicloud attestation capabilities, you can choose the level of security you need to realize more value from your data while remaining protected and compliant.

Explore the portfolio

Intel® TDX

Enhance confidentiality and integrity at the VM level, heighten privacy, and take control of your data.

Intel® Trust Authority

Enable zero trust attestation that verifies the trustworthiness of compute assets at the network and edge and in the cloud.

Explore All the Ways to Get Started on Intel® SGX

Whether you’re a new developer, a seasoned expert, or an industry researcher, we offer a comprehensive portfolio of resources, technical information, and tools to help you develop new ways to enhance application isolation security.

Find Ready-to-Deploy Solutions

Security professionals can connect with Intel partners, OEMs, and cloud service providers and discover how Intel® SGX products and solutions can help solve the toughest security challenges.

Explore solutions

Write Your Intel® SGX Code Today

Developers can download essential Intel® SGX tools, guides, SDK packages, and more to get solutions to market faster.

Start coding

Access Product Assurance Information

Industry researchers and curious security professionals can explore our ongoing product security assurance for Intel® SGX and other Intel® security technologies.

Learn more

Show more Show less

Microsoft Selects Azure Confidential Computing Using Intel® SGX

Microsoft now hosts their e-commerce payment services on Azure Confidential Computing in the public cloud, having already moved US$25 billion in annual credit card transactions to the cloud as of November 2023.

To help meet or exceed current PCI DSS standards, Microsoft uses Azure confidential computing and Intel® SGX application enclaves running Azure Kubernetes Service node pools.

Learn why Microsoft trusts Azure with Intel® SGX

See How Security-Sensitive Organizations Are Succeeding with Intel® SGX

Revolutionizing healthcare with BeeKeeperAI and Intel

Alibaba Builds End-to-End PPML Solution

AI MINDSystems: Self-sovereign AI Aids in Decentralization of Health Data and Personal Data

Show more Show less


View all customer stories

Learn More About Intel® Security Solutions

Intel® SGX Resources

Developer Resources

Which Intel Trusted Execution Environment is right for you?

Confidential AI at Intel

Confidential Computing and Intel® Security Resources

Intel® Security Engines

Four Facts: Intel at the Foundation of Confidential Computing

Security Starts with Intel

  • Overview
  • Get Started
  • Customer Stories
  • Resources
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo