• <More on Intel.com

Enterprise Server Security

Enhanced enterprise security to address key infrastructure and regulatory challenges

While security has always been a top priority, enterprise security has become especially crucial in today’s evolving IT and cloud computing technology landscapes.

Data today travels across unknown cloud environments, and mobile users roam outside the corporate firewall, which is why the Intel® Xeon® processor E5 family and the Intel® Xeon® processor E7 family provide new levels of hardware-based enterprise security capabilities. To bolster cloud and enterprise security and deliver secure transactions from the data center out, Intel® processor features include:

  • Increased protection: Intel® Trusted Execution Technology (Intel® TXT) evaluates software component integrity and provides a hardware-based root of trust for enhanced security against malicious software attacks that occur before the virtual machine manager boots. Intel TXT also allows platform integrity status to be reported into management software, providing visibility and a powerful control point for managing the security of virtualized workloads.1
  • Pervasive encryption: Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) strengthens data protection with built-in capabilities that dramatically reduce the security performance tax on your systems. New instructions enable fast, secure data decryption and encryption that are up to ten times faster than previous-generation software encryption technology.2, 3
  • More secure virtualization: Intel® Virtualization Technology (Intel® VT) enhances cloud infrastructure security by providing hardware-based isolation of virtualized workloads that are sharing a common set of hardware platform resources such as memory or I/O—giving the desired isolation of data and workloads.4

The advanced security innovation built into Intel TXT and Intel AES-NI delivers hardware-based capabilities to meet the needs of enterprises and enhance security in the cloud.  In addition, users can ease cloud adoption with Intel’s application security solutions including Intel® Expressway Service Gateway and Intel® Expressway Cloud Access 360.

Comprehensive security begins with the processor


Product and Performance Information


1. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html. In addition, Intel TXT requires that the original equipment manufacturer provides TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be initialized and may not be available in all countries.

2. Source: Testing with Oracle Database Enterprise Edition* with Transparent Data Encryption (TDE) AES-256 shows as much as a 10x speedup when inserting one million rows 30 times into an empty table on the Intel® Xeon® processor X5680 (3.33 GHz, 36 MB RAM) using Intel® Integrated Performance Primitives (Intel® IPP) routines, compared to the Intel® Xeon® processor X5560 (2.93 GHz, 36 MB RAM) without Intel IPP.

3. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. Results have been measured by Intel based on software, benchmark or other data of third parties and are provided for informational purposes only.  Any difference in system hardware or software design or configuration may affect actual performance.  Intel does not control or audit the design or implementation of third party data referenced in this document.  Intel encourages all of its customers to visit the websites of the referenced third parties or other sources to confirm whether the referenced data is accurate and reflects performance of systems available for purchase.

4. Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.