Discover hardware-based technologies that lower costs, increase security, and simplify the management of intelligent systems. (v.1, Aug. 2013)
Descubra tecnologías basadas en hardware, como la Tecnología de administración activa Intel® y el procesamiento de paquetes, que disminuyen los costos, aumentan la seguridad y simplifican la administración de los sistemas inteligentes. (v.1, agosto de 2013)
Guide explains how to set up and deploy a trusted cloud solution on bare-metal servers, using elements from Intel, IBM Cloud SoftLayer*, VMware, and HyTrust, helping to create a chain of trust from hardware through hypervisor and management apps.
Follow the steps to activate your Intel® Trusted Execution Technology (Intel® TXT) and explore useful resources to maximize this security solution.
Follow these four steps to activate your Intel® Trusted Execution Technology (Intel® TXT) and explore useful resources to get the most from this trusted security solution.
Brief:This solution integrates with IT infrastructure, enabling trusted compute pool infrastructure, geographic fencing of workloads, and attestation.
Solution Brief: Scalable Trust Provisioning for a software defined architecture seamlessly integrates existing infrastructure enabling compute pool infrastructure, geographic fencing of workloads, and attestation.
Intel ensures data protection by consulting with global security experts, supporting key security standards, security innovations, and secure systems.
Intel ensures data protection by consulting with global security experts, supporting key security standards, security innovations, and systems.
Solution Brief: Gain a trusted infrastructure with a solution from HyTrust, VMware and that provides data security on a virtualized platform.
Solution Brief: Gain a trusted, compliant infrastructure with a solution from HyTrust, VMware, and Intel that allows administrators to set consistent policies, audit data security, encryptions, and geolocation for a virtualized cloud infrastructure.
Explore a video collection of applications, benefits, and cloud and enterprise security examples for Intel® Trusted Execution Technology.
Explore Intel® Trusted Execution Technology through a collection of videos covering applications, benefits, and examples of how the technology can provide enterprise and cloud security.