Explore a video collection of applications, benefits, and cloud and enterprise security examples for Intel® Trusted Execution Technology.
Explore Intel® Trusted Execution Technology through a collection of videos covering applications, benefits, and examples of how the technology can provide enterprise and cloud security.
Chip Chat’s Allyson Klein interviews Jim Greene, discussing the future of data center security, how to stay ahead of threats, and his new book.
Trusting the Cloud starts with Intel® Trusted Execution Technology to protect against hypervisor vulnerabilities that threaten many virtual machines.
Discusses how trusting the Cloud starts with Intel® Trusted Execution Technology to protect against hypervisor vulnerabilities that enable malware attacks or other security threats to target many virtual machines at once.Vista completa >
Brief: HyTrust and Intel developed an end-to-end security solution to address the risks associated with server virtualization and cloud technology.
Brief: HyTrust and Intel developed an end-to-end security solution to address the challenges of maintaining a security system for server virtualization and cloud technology and to help accelerate adoption.
Study: SPAR Magyarország uses Intel® Xeon® processor E7 family to keep mission-critical data on the move with superior performance and scalability.
Study: Intel® Xeon® processor E7 family helps keep mission-critical data on the move, underpinning non-stop retail for SPAR Magyarország with superior performance, scalability, memory, and I/O capability for applications.
Measured launched environment developer’s guide for platform-level enhancements, provides the building blocks to create trusted platforms.
The measured launched environment developer’s guide on Intel’s technology for safer computing, Intel® Trusted Execution Technology (Intel® TXT) defines platform-level enhancements that provide the building blocks for creating trusted platforms.
Intel® embedded platform architect provides discussion on implementing Intel(R) TXT for embedded applications.
Discusses how Intel® Trusted Execution Technology uses data verification to ensure a system is in a trusted configuration on every boot, protecting high security environments. (v.001, Dec. 2010)
Case Study: DuPont builds private cloud infrastructure using Intel® Trusted Execution Technology to support growth and increase data center security.
Case Study: DuPont builds private, high-performance cloud infrastructure using Intel® Trusted Execution Technology to support growth in modeling, simulation informatics, and analytics, while increasing data center security and compliance.