Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.
A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models: cryptography for data protection, identity and access management, service gateways, and trusted compute pools.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Enhancing server and cloud security with Intel® Trusted Execution Technology
Parallels discusses building a cloud with Trusted Compute Pools
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to the cloud while keeping sensitive back-end database servers secure in your data center.
Trusted compute pools with Intel® TXT
Research video about networking and storage.