Cyber-attacks are moving down the computing stack, traversing from software to hardware, threatening devices in homes, cars, businesses, networks, and cloud. The legacy model of software protecting software can’t keep up with advancing threats against digital security, safety, and privacy. Intel builds hardware-enabled security capabilities directly into our silicon to help protect every layer of the compute stack (hardware, firmware, operating systems, applications, networks, and the cloud).
Intel® Threat Detection Technology (Intel® TDT) is a suite of hardware-enhanced technologies that can be incorporated into independent software vendors security solutions to augment existing capabilities and improve the detection of evolving cyber threats and exploits. Intel TDT is built into the underlying silicon and uses a combination of CPU data, machine-learning algorithms, and Intel-integrated graphics for security workloads.
The following capabilities are now available:
Intel® Security Essentials provides a built-in foundation of core security capabilities that accelerate the ecosystem’s adoption of high assurance hardware-enabled security for trusted computing. These capabilities are available across Intel® processors, and they enable security professionals to protect platforms and data, while building trusted applications in a consistent way.
Intel offers several ground breaking technology solutions that automate, accelerate, and scale security beyond software or human based approaches. Intel® Threat Detection Technology (Intel® TDT) is a suite of hardware assisted technologies that can be incorporated into ISV security solutions to augment their existing capabilities to improve the detection of advanced cyber threats and exploits. Intel® Software Guard Extensions (Intel® SGX)2 provides unique capabilities that help improve the privacy, scalability, and trust in blockchain solutions.
You’ve read the headlines. It’s time to modernize your endpoint security strategy and software alone is not enough. Strengthen identity and access management with security built into 7th Gen Intel® Core™ vPro™ processor-based devices.
Trusted infrastructure is the foundation of data center security solutions, protecting data and users from the silicon root, up the entire stack, into the cloud.
Providing a portfolio of hardware assisted security solutions that harden edge devices, enable communications, and deliver command and control from security management platforms.
Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://www.intel.ca.
© 2017 Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others.