Enterprise Multilevel Security
Comprehensive security for a more connected world
The world will continue to run faster with the increasing use of computing devices connected to each other through the global Web. Netbooks, smartphones, handheld retail devices—conservative estimates suggest that by 2015, 10 billion devices will be in active use. As dependency on computing devices grows, so does IT’s exposure to threats and compromised data and assets.
Intel is collaborating with leading security solution providers to increase security by establishing a hardware root of trust—the use of Intel® Trusted Execution Technology— from which virtualization security management software can get accurate information about any platform and its operating environment. The goal is to present a unified, policy-based assessment of an organization’s security and compliance posture using a central dashboard.
This approach will provide unprecedented visibility into actual conditions within the bottommost layers of the cloud, where protecting a company’s data and assets becomes more of a challenge. Identity theft is a growing concern, as IT staff and employees continually share passwords to perform their jobs. Malware is also a consistent security challenge. Cloud computing environments offer great flexibility, but IT needs to be confident that an infrastructure is trustworthy before making any migration.
To keep pace here at Intel, our own IT department is spearheading a radical five-year redesign of Intel’s information security architecture. The new redesign is intended to support key initiatives and technology trends such as IT consumerization, the compute continuum, and cloud computing.
To help you respond to evolving security threats, we’ve infused security into every aspect of our hardware solutions to keep corporate data and assets safer at every level.
Intel® Advanced Encryption Standard New Instructions (AES-NI) —This new instruction set accelerates data encryption in Intel® Xeon® and Intel® Core™ processors by implementing part of the security algorithm in the hardware to make pervasive encryption a performance reality.
Intel® Trusted Execution Technology (Intel® TXT)—Intel TXT provides a processor-based enforcement point to check for malicious software on client and server platforms by checking the consistency in behaviors and launch-time configurations.
Intel® Virtualization Technology—Working with Intel® TXT, Intel Virtualization Technology (Intel® VT) complements virtualization acceleration and VM isolation functions to help protect the integrity and confidentiality of workloads in virtualized environments.
Intel® Identity Protection Technology (Intel® IPT)—Intel IPT is a powerful, additional layer of security that links users’ PCs to online assets, decreasing the ability of thieves to access account information from non-associated computers.