Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel® Trust Domain Extensions (Intel® TDX)

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel® Trust Domain Extensions (Intel® TDX)

Control access to data in use—whether in the cloud or in the data center—by isolating data and applications in a virtual machine (VM) protected by Intel TDX®.

Intel® TDX Connect on Intel® Xeon® 6

Intel® Xeon® 6 processor with Performance-cores have hardware support for Intel® TDX Connect technology. This capability is critical to enabling confidential usage models that extend beyond the CPU to connected devices like GPUs, Smart NICs or storage devices.

Learn more

Support Business Growth While Managing Risk

Businesses and their operations teams face the monumental task of enabling continuous innovation while combatting cyberattacks and data breaches that can result in losses of valuable data or intellectual property, compliance issues, and reputational damage.

Intel® TDX is Intel’s newest confidential computing technology that helps to strategically narrow the attack surface and increase data and application protection and confidentiality in the data center or in the cloud through hardware-level isolation within a virtual machine (VM).

VM isolation with Intel® TDX simplifies the porting and migration of existing applications to a confidential computing environment. In most cases, no application code changes are required to activate a trusted domain enabled by Intel® TDX inside a VM.

Establish Data Sovereignty and Control

Intel® TDX enables organizations to control the use of valuable data and intellectual property by isolating it within confidential VMs that minimize security risks and by limiting protected data access to only software or administrators with explicit permission. Within the VM, Intel® TDX isolates the guest OS and applications from the cloud host, underlying hypervisor, cloud management stack, and other VMs.

Protect Data and Intellectual Property

Intel® TDX helps to reduce attack surfaces and mitigate the risk of data breaches, tampering, or theft by outside entities—either malicious attackers, rogue cloud admins, or other cloud tenants—through hardware-enhanced isolation of confidential data in a trusted execution environment (TEE) within a VM. It accommodates a wide range of deployments, including large application suites with a full-featured OS, multiple containers, or small, highly specialized VMs with a lightweight OS and purpose-built, privacy-preserving applications.

Simplify Regulatory Compliance

Intel® TDX, Intel® SGX, and other Intel® Security Engines can help organizations governed by stringent data privacy regulations—such as those in healthcare, finance, and the public sector—meet compliance standards with encryption and secure enclaves that protect sensitive data in use while maintaining full data availability for authorized uses and users.

Deploy AI in a Trusted Environment

Intel® TDX helps protect apps, data, and AI models from unauthorized access with robust isolation, integrity, and confidentiality capabilities. Its security capabilities support the use of sensitive data for training and analysis of AI models without exposing that data to other software, collaborators, or cloud providers.

Show more Show less

Looking for Information on Application Isolation?


Intel® Software Guard Extensions (Intel® SGX) enables users to restrict access to their most sensitive applications and data in a protected enclave with the smallest trust boundary available, compared to other confidential computing technologies.

Discover Intel® SGX

Discover the Intel® Confidential Computing Portfolio

Our confidential computing portfolio offers three security technologies to meet the unique needs and regulatory requirements of businesses of all sizes across industries. With application isolation, VM isolation, and operator-independent, multicloud attestation capabilities, you can choose the level of security you need to realize more value from your data while remaining protected and compliant.

Explore the portfolio

Intel® SGX

Protect data confidentiality and integrity within the smallest available trust boundary.

Intel® Tiber™ Trust Authority

Enable zero trust attestation that verifies the trustworthiness of compute assets at the network and edge and in the cloud.

Get Started with Intel® TDX

Intel® TDX technology is currently available through these cloud service providers:

Alibaba

Learn how to build and verify a confidential computing environment on an Intel® TDX-protected Elastic Compute Service (ECS) instance.

Find out more

Google Cloud

Leverage Intel® TDX on this robust cloud infrastructure for advanced data protection and seamless integration with your existing systems.

Learn more

Microsoft Azure

Harness the power of Intel® TDX on Microsoft Azure, a flexible and scalable cloud computing platform designed for secure and efficient operations.

Learn more on the Intel® cloud blog

Read the Microsoft announcement

Show more Show less

See How Security-Sensitive Organizations Are Succeeding with Intel® TDX

Ant Group Maximizes with Confidential AI

Read the brief

Thales and Intel enable advanced protection for the Google Cloud ecosystem

Learn more

HashiCorp Vault with Intel® TDX

Learn more

Show more Show less

Learn More about Intel® Security Solutions

Intel® TDX developer resources

Intel’s approach to security

Security Accelerated product brief

Frequently Asked Questions

Intel® TDX is available through select cloud service providers using 4th Gen Intel® Xeon® Scalable processors and is widely available with the release of 5th Gen Intel® Xeon® Scalable processors.

Intel® TDX relies on VM isolation, which simplifies porting of existing applications to a confidential computing environment. In most cases, no application code changes are required. Application-based isolation with Intel® SGX can help shrink the attack surface further, but more development effort may be needed to design code for the Intel® SGX environment.

  • Overview
  • Product Information
  • Get Started
  • Customer Stories
  • Resources
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo