Looking for the Security Center? For more information on Intel’s Security First Pledge and latest advisories, click below.
Security is an ongoing priority, not a one-time event or project. We are committed to helping advance security and performance as the cornerstone of future architectures using world-class product development policies, processes, and tools. Our security design principles require designers, developers, coders, validators, and architects to proactively and consistently consider the security implications of design decisions and to build resilience into our products.
As cyberattacks move down the layers of the system stack, software-only security is no longer sufficient. Security established at each layer is only as secure as the next-lowest layer. To maintain a more secure computing environment, organizations should build on top of a root of trust that is established at the most foundational system layer: the silicon.
Intel’s products are architected to deliver advanced security, with built-in, silicon-enabled security technologies that help protect potential attack surfaces. Rooted in silicon, our security technologies are meant to operate beyond the reach of potentially corrupted software, which helps create a trusted foundation for computing that customers can depend on.
Silicon-enabled security technologies help create a trusted foundation that CSPs, ISVs, OSVs, and OEMs can leverage to deliver security-optimized solutions to customers.
By adopting Intel-enabled partner solutions, customers are better empowered to ensure hardware platform integrity, protect their data and identities, and detect threats.
Intel enables a comprehensive portfolio of solutions spanning edge, endpoint, data center, cloud, and network with a common foundation of silicon-enabled security capabilities across Intel Atom® processor, Intel® Core™ processor, and Intel® Xeon® processor-based lines.
Enabling transparency and assurance across a system’s lifecycle, supply chain owners can improve platform integrity, resilience and security.
Protection controls that help safeguard sensitive IP and workload data wherever the data resides.
Built-in security features that help organizations mitigate risks in this increasingly complex threat landscape.
Silicon technologies such as Intel® SGX and Intel® Xeon® Scalable processors help to solve privacy, security, and scalability challenges.
Boost data protection and reliability across cloud services with technology and software optimizations.
Security capabilities to secure your reconfigurable logic designs, system, and data.
A secure foundation, coupled with capabilities for automatic recovery, traceability service, and authenticity of a PC purchase to front-foot customers.
Since every customer is unique, we offer a variety of runtime data encryption options to fit customer-specific needs— from Total Memory Encryption to Multi Key TME to Software Guard Extensions.
Hardened Security Solution help to protect high-value data at runtime through a hardened full-stack security solution.
Leverage a hardware-based identity to enable simple and trusted IoT device onboarding using device management services.
To help protect you from malicious code injection, Intel provides technologies which include Intel® Platform Protection Technology with OS Guard and Intel® Runtime BIOS Resilience.
Enhance security and compression performance in cloud, networking, big data, and storage applications—for data in motion and at rest.
Tool to check and validate a component’s integrity at any given point along the supply chain.
To develop advanced, new security solutions, Intel collaborates with developers and the open source community. We work with universities and researchers. And we invest in leading-edge cybersecurity start-ups through our Intel Capital program.
Intel is innovating across six pillars of technology development to unleash the power of data for the industry and our customers.
No product or component can be absolutely secure.