Enhanced Data Protection with Hardware-Assisted Security

Secure Computing with Hardware-Assisted Security

Conservative estimates suggest that by 2015, over 10 billion personal electronic devices will be in active use—and the vast majority of these will be mobile- and Web-enabled. With this rapidly expanding dependence on computing devices comes the need to create more secure software and hardware products for businesses and consumers to prevent exposure to malicious code, viruses, cyber espionage, malware, and data theft.

Intel's Approach to Security

Intel continues to enhance systems so they run more securely. A key component of this approach is providing more robust, vulnerability-resistant platforms. Security features are embedded in the hardware of Intel® processors, including three of Intel's newest server processors—the Intel® Xeon® processor E3 v2 family, the Intel® Xeon® processor E5 family, and the Intel® Xeon® processor E7 family, as well as 3rd generation Intel® Core™ vPro™ processors.

However, Intel® products are only part of making computing more secure. We recognize the need to engage the entire technology ecosystem to cultivate more complete protection. With this in mind, Intel continues to strengthen its relationship with both software and hardware security vendors for complementary solutions. It also works with traditional general-purpose software providers to encourage greater implementation of secure computing.

Embedded Security Features

“Blanket” protection – Intel® vPro™ technology with built-in security capabilities protects the PCs in your IT environment.1

Identity protection – Authentication technology built right into the hardware of select 3rd generation Intel® Core™ processors protects user identity and online access points.2

Asset protection – Intel® Anti-Theft Technology protects your corporate data by locking down your lost or stolen laptop.3

Data protection – Faster decryption and encryption through Intel® AES–NI.4

Malware protection – Intel® Trusted Execution Technology hardware-assisted security protects the IT infrastructure from software-based attacks and provides a powerful new control point for virtualized and cloud workloads.5

Hardware-assisted virtualization – Enables IT to verify the trustworthiness of a virtualized pool of platforms.6

Product and Performance Information

open

1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html. 

2. No computer system can provide absolute security under all conditions. Built-in security features may require third party software, hardware, or services, and an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.

3. No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, and firmware and software optimized to use the technologies. Consult your system manufacturer and software vendor for more information.

4. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.

5. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html. In addition, Intel TXT requires that the original equipment manufacturer provides TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be initialized and may not be available in all countries.

6. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.