Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Hardware-Enabled Security

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Hardware-Enabled Security Technology

Intel hardware-enabled security boosts protection and enables the ecosystem to better defend against evolving and modern cybersecurity threats.

Infographic: Intel security technologies

Enabling Innovation with Security at the Core

Security is a system property rooted in hardware, with every component from software to silicon playing a role in helping secure data and maintain device integrity. We have a suite of technologies to build and execute on a defense in-depth strategy, with solutions spanning threat detection, data/content protection, memory protection and more.

Intel's security solutions meet specific challenges centered around three key priorities:

  • Foundational Security: critical protection to help verify trustworthiness of devices and data.
  • Workload and Data Protection: trusted execution for hardware-isolated data protection.
  • Software Reliability: platforms that help protect against a range of cybersecurity threats.

Together, these innovations help drive our vision for a world where all data is encrypted.

Foundational Security

Ensuring a critical base of protection across the platform, focused on identity and integrity. Intel has a long history delivering technology to help ensure the platform comes up correctly and runs as expected. Our security engines have been used more than a billion times worldwide, and our processors feature enhanced cryptography to accelerate performance and help secure global commerce.

  • Intel® Crypto Acceleration
  • Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)
  • Intel® BIOS Guard
  • Intel® Boot Guard
  • Intel® Converged Security and Management Engine (Intel® CSME)
  • Intel® Platform Firmware Resilience (Intel® PFR)
  • Intel® Platform Trust Technology (Intel® PTT)
  • Intel® QuickAssist Technology (Intel® QAT)
  • Intel® Runtime BIOS Resilience
  • Intel® System Resources Defense
  • Intel® System Security Report
  • Intel® Total Memory Encryption (Intel® TME)
  • Tunable Replica Circuit – Fault Injection Detection
  • Intel® Total Memory Encryption – Multi-Key (Intel® TME-MK)
  • Intel® Trusted Execution Technology (Intel® TXT)

Workload and Data Protection

Providing every legitimate workload with a trusted execution environment for hardware-isolated protection of data in use, scaled to fit workloads of varying sizes.

Once we have a solid foundation, security technologies extend to help protect virtual machines and operating systems against targeted attacks.

  • Advanced Programmable Interrupt Controller Virtualization
  • Intel® OS Guard
  • Intel® Secure Key
  • Intel® Software Guard Extensions (Intel® SGX)
  • Intel® Virtualization Technology (Intel® VT)
  • Intel Virtualization Technology – Redirect Protection (Intel® VT-rp)
  • Mode-Based Execution Control

Software Reliability

Intel delivers hardware platforms with protections against common and emerging software attacks, which increases efficiency and preserves performance. We are working to harden software and move select security capabilities to hardware, adding more layers of verification.

  • Extended Page Tables Sub-page Write Protection (EPT-SPP)
  • Intel® Control-Flow Enforcement Technology (Intel® CET)
  • Intel® Threat Detection Technology (Intel® TDT)
  • Anomalous Behavior Detection for Intel TDT
  • Page Protection Keys
  • User-Mode Instruction Prevention (UMIP)
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information
  • Recycling

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo