Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Confidential Computing Solutions

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel® Confidential Computing Solutions

Pursue new business models and enable data sharing across on-premises locations, edge devices, and cloud servers—even when working with sensitive or regulated data.

Drive More Value from Your Private or Regulated Data

Protecting your systems and data has never been more critical, especially when working with sensitive, confidential, or regulated data. Intel® confidential computing solutions are designed to protect data in use with isolation, encryption and control, and verification capabilities to help you unlock new opportunities for business collaboration and insights.

From AI-powered healthcare to fraud prevention, confidential computing helps to enable more collaboration, insights, and innovation with less risk. What will it do for you?

See What’s Possible with Intel® Confidential Computing Solutions

Confidently migrate to the cloud knowing that you remain in control of your data

Maintain privacy while collaborating on multiparty analysis

Strengthen compliance and data sovereignty programs

Activate hardware-based isolation and access controls

Show more Show less

Collaborate with Confidence with Intel® Confidential Computing Solutions

Find solutions for your most complex security challenges with our comprehensive confidential computing portfolio. Offering both application and virtual machine (VM) isolation, our confidential computing solutions give you flexibility to set the trust boundary you need for your workloads.

Intel® Software Guard Extensions (Intel® SGX)

Unlock new opportunities for business collaboration and insights—even with sensitive or regulated data. Intel® SGX is the most researched and updated confidential computing technology in data centers on the market today, with the smallest trust boundary.

Learn how Intel® SGX works

Intel® Trust Domain Extensions (Intel® TDX)

Increase confidentiality at the VM level, enhance privacy, and gain control over your data with Intel® TDX. It enables isolation of the guest OS and VM applications, which removes access from the cloud host, hypervisor, and other VMs on the platform.

Learn how Intel® TDX works

Intel® Tiber™ Trust Authority

Take confidential computing to the next level with a zero trust attestation SaaS that verifies the trustworthiness of compute assets at the network, edge, and in the cloud.

Learn how Intel® Tiber Trust Authority works

Why Intel for Your Confidential Computing Solutions?

Since launching Intel® SGX in 2018, we’ve been dedicated to advancing and scaling confidential computing solutions globally. We continue to innovate and expand our portfolio to provide more advanced security options that meet your needs—including multicloud trust services, virtual machine isolation, and remote attestation—while continuously updating platforms to address vulnerabilities. Discover all the ways you can benefit from confidential computing solutions from Intel.

Read infographic: Four Facts: Intel at the Foundation of Confidential Computing

Get Hands-On Experience with Confidential Computing Solutions Today

Start experimenting with confidential computing solutions on Intel® Xeon® Scalable processors with code-ready reference solutions, prebuilt scripts, and complimentary tools.

Try Out Confidential Computing

Use the Intel® Developer Cloud to test Intel® SGX and Intel® TDX on the latest Intel® hardware and software—no setups, configurations, installations, or downloads required.

Go to Intel® DevCloud

Intel® SGX Solutions and Services

Connect with Intel partners, OEMs, and cloud service providers to discover products and solutions that address your toughest business challenges.

See available solutions

Accelerate Your Confidential Computing Efforts with Developer Resources

Developer Tools and Resources

Access developer resources and reference libraries to help you prepare, build, deploy, and scale your solutions.

Intel® SGX developer overview

Intel® TDX developer overview

Build Your Own End-to-End Solution

Visit the Confidential Computing Zoo (CCZoo) to access a collection of code-ready reference solutions.

Visit CCZoo on GitHub

Deploy Intel® SGX Applications without Code Modification

Discover how the Gramine library OS drastically simplifies the deployment of Intel® SGX solutions with only a push of a button for protecting applications and data.

Learn about Gramine

Get detailed info on Gramine

Download Curated Containers

Visit the Azure Marketplace or GitHub to access code-ready reference solutions that help transform any Docker image for use with Gramine. Curated containers are available for PyTorch, TensorFlow, scikit-learn, MariaDB, Redis, Memcached, MySQL, and OpenVINO.

See curated containers on the Azure Marketplace

See curated containers on GitHub

Show more Show less

See What Others Are Accomplishing with Confidential Computing

See all customer stories

Microsoft Deploys Confidential Computing To Protect $25B per Year in Customer Payments

Read more

Self-sovereign AI Aids in Decentralization of Health Data and Personal Data

Watch video

Explore Additional Confidential Computing Resources

Access articles, partner solutions, product briefs, and videos to learn more about confidential computing.

Video: Federated Learning

Customer Success Story: BeeKeeperAI

Customer Success Story: Fortanix Confidential AI

Learn Why Security Begins with Intel

Intel's Security Approach

Intel applies and advances best known methods to integrate security principles throughout product design, build, and support.

Learn more

Intel® Security Engines

Whether you’re working in the cloud, at the edge, or on-premises, Intel® Security Engines help you extract the most value from sensitive or regulated data.

Learn more

  • Overview
  • Product Information
  • Get Started
  • Customer Stories
  • Resources
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo