Enhanced Data Protection with Hardware-Assisted Security
Conservative estimates suggest that by 2015, more than 10 billion personal electronic devices will be in active use—and the vast majority of these will be mobile- and Web-enabled. With this rapidly expanding dependence on computing devices comes the need to create more secure software and hardware products for businesses and consumers to prevent exposure to malicious code, viruses, cyber espionage, malware, and data theft. This is also one of the drivers behind the rapid growth in cloud computing architectures for enterprises and consumers alike.
Overcoming data center security challenges
The hosting and scaling of data centers into cloud infrastructures creates new security challenges and risks for businesses and consumers. While cloud technologies promise to bring automation and agility to data center operations, they also challenge many of the underlying traditional security tools and physical control once enjoyed by IT. New tools are needed to address growing security challenges, such as establishing visibility to the state of the servers and assuring data confidentiality in the cloud and virtualized data centers—especially for mission-critical or sensitive data or workloads.
Intel's approach to security
Intel continues to enhance systems so they run more securely. A key component of this approach is providing more robust, vulnerability-resistant platforms. Security features are embedded in the hardware of Intel® processors, including three of Intel's newest server processors—the Intel® Xeon® processor E3 v2 family, the Intel® Xeon® processor E5 family, and the Intel® Xeon® processor E7 family, as well as 3rd generation Intel® Core™ vPro™ processors.
However, Intel® products are only part of making computing more secure. We recognize the need to engage the entire technology ecosystem to cultivate more complete protection. With this in mind, Intel continues to strengthen its relationship with both software and hardware security vendors for complementary solutions. It also works with traditional general-purpose software providers to encourage greater implementation of secure computing.
Embedded Security Features
Explore the Intel technologies that enable systems to run more securely.
1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.