Strengthening Security Protection
Intel® hardware-enabled security boosts protection and enables the ecosystem to better defend against evolving and modern threats.1
Enabling Innovation with Security at the Core
Cyber-attacks are moving down the computing stack, traversing from software to hardware, threatening devices in homes, cars, businesses, networks, and cloud. The legacy model of software protecting software can’t keep up with advancing threats against digital security, safety, and privacy. Intel builds hardware-enabled security capabilities directly into our silicon to help protect every layer of the compute stack (hardware, firmware, operating systems, applications, networks, and the cloud).
Read the RSA blog for the latest silicon security innovations ›
Hardware-Enhanced Threat Detection
Intel® Threat Detection Technology (Intel® TDT) is a suite of hardware-enhanced technologies that can be incorporated into independent software vendors security solutions to augment existing capabilities and improve the detection of evolving cyber threats and exploits. Intel TDT is built into the underlying silicon and uses a combination of CPU data, machine-learning algorithms, and Intel-integrated graphics for security workloads.
The following capabilities are now available:
- Accelerated Memory Scanning (AMS) for security workloads
- Exploit detection using advanced platform telemetry
Read the Intel® Threat Detection Technology (Intel® TDT) product brief ›
View the Intel® Threat Detection Technology (Intel® TDT) demo video ›
Best Practice Security Designed-in from the Start
Intel® Security Essentials provides a built-in foundation of core security capabilities that accelerate the ecosystem’s adoption of high assurance hardware-enabled security for trusted computing. These capabilities are available across Intel® processors, and they enable security professionals to protect platforms and data, while building trusted applications in a consistent way.
The Power of Hardware-Enabled Security Technologies
Intel offers several ground breaking technology solutions that automate, accelerate, and scale security beyond software or human based approaches. Intel® Threat Detection Technology (Intel® TDT) is a suite of hardware assisted technologies that can be incorporated into ISV security solutions to augment their existing capabilities to improve the detection of advanced cyber threats and exploits. Intel® Software Guard Extensions (Intel® SGX)2 provides unique capabilities that help improve the privacy, scalability, and trust in blockchain solutions.
Learn more about Intel® Software Guard Extensions (Intel® SGX) solutions for blockchain ›
Protecting the Connected World
Enterprise
You’ve read the headlines. It’s time to modernize your endpoint security strategy and software alone is not enough. Strengthen identity and access management with security built into 7th Gen Intel® Core™ vPro™ processor-based devices.
Consumer
Taking the hassle out of securing your digital life. For your identity, data, passwords, and financial transactions, get protection beyond software, rooted in silicon.
Data Center
Trusted infrastructure is the foundation of data center security solutions, protecting data and users from the silicon root, up the entire stack, into the cloud.
Internet of Things (IoT)
Providing a portfolio of hardware assisted security solutions that harden edge devices, enable communications, and deliver command and control from security management platforms.
Infos sur le produit et ses performances
Les fonctionnalités et avantages des technologies Intel® dépendent de la configuration du système et peuvent nécessiter du matériel et des logiciels compatibles, ou l'activation de services. Les résultats varient selon la configuration. Aucun produit ou composant ne saurait être totalement sécurisé en toutes circonstances. Consultez le constructeur ou le revendeur de votre ordinateur. Apprenez-en plus sur https://www.intel.ca.
© 2017 Intel Corporation. Tous droits réservés. Intel et le logo Intel sont des marques commerciales d'Intel Corporation ou de ses filiales, aux États-Unis et/ou dans d’autres pays.
*Les autres noms et marques peuvent être revendiqués comme la propriété de tiers.