Reset Search
Keyword
BUILDERS PROGRAM

BUILDERS PROGRAM Reset

  • All
  • Attestation, Compliance Mapping, Isoation
  • Data Sovereignty, Confidentiality, Geo Control
  • Intel® AES New Instructions (Intel® AES NI)
  • Intel® Software Guard Extensions (Intel® SGX)
  • Intel® Trusted Execution Technology (Intel® TXT)
  • Recovery, Resilience
Attestation, Compliance Mapping, IsoationData Sovereignty, Confidentiality, Geo ControlIntel® AES New Instructions (Intel® AES NI)Intel® Software Guard Extensions (Intel® SGX) Intel® Trusted Execution Technology (Intel® TXT)Recovery, Resilience
Clear All
Intel® Data Center Builders
White paper
Intel® Data Center Builders - White paper
Anqlave Data Vault* (ADV*) helps solve the secret-management problem by allowing users to create, store, transport, and use secrets with improved security. ADV helps ensure that secrets are not available in plaintext, whether at rest, in motion, or in use. Secrets receive protection at rest and in motion using encryption, and they are used inside protected memory regions, called enclaves, which are created using Intel® Software Guard Extensions (Intel® SGX).
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

Anqlave Data Vault* (ADV*) helps solve the secret-management problem by allowing users to create, store, transport, and use secrets with improved security. ADV helps ensure that secrets are not available in plaintext, whether at rest, in motion, or in use. Secrets receive protection at rest and in motion using encryption, and they are used inside protected memory regions, called enclaves, which are created using Intel® Software Guard Extensions (Intel® SGX).

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
SoftLayer, and IBM Company, uses Intel® Trusted Execution Technology (Intel® TXT) to provide security controls to help ensure that your workloads are running on trusted hardware.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

SoftLayer, and IBM Company, uses Intel® Trusted Execution Technology (Intel® TXT) to provide security controls to help ensure that your workloads are running on trusted hardware.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
VeriClouds CredVerify uses Intel® Software Guard Extensions (Intel® SGX) to protect the sensitive credential verification process with hardware-based crypto built inside the CPU. The solution significantly advances the security of VeriClouds service.
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

VeriClouds CredVerify uses Intel® Software Guard Extensions (Intel® SGX) to protect the sensitive credential verification process with hardware-based crypto built inside the CPU. The solution significantly advances the security of VeriClouds service.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Analytics workloads benefit from extensive collaboration between Intel and Oracle, resulting in innovation and optimized data warehousing performance using Intel® Xeon® Scalable processors and Intel® Optane™ storage.
Categories: 
Security - Intel® AES New Instructions (Intel® AES NI)

Analytics workloads benefit from extensive collaboration between Intel and Oracle, resulting in innovation and optimized data warehousing performance using Intel® Xeon® Scalable processors and Intel® Optane™ storage.

Intel® Data Center Builders
Whitepaper
Intel® Data Center Builders - Whitepaper
This whitepaper describes Fortanix Runtime Encryption for Intel® SGX. Runtime Encryption transparently enables workloads to use Intel SGX enclaves for their cryptographic protection from rogue insiders, compromised OS, malware, and other vulnerabilities. To illustrate use cases for Runtime Encryption, a Self-Defending Key Management Service* (SDKMS) is described that delivers cloud-ready unified HSM and Key Management capabilities.
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

This whitepaper describes Fortanix Runtime Encryption for Intel® SGX. Runtime Encryption transparently enables workloads to use Intel SGX enclaves for their cryptographic protection from rogue insiders, compromised OS, malware, and other vulnerabilities. To illustrate use cases for Runtime Encryption, a Self-Defending Key Management Service* (SDKMS) is described that delivers cloud-ready unified HSM and Key Management capabilities.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
This Solution Brief discusses new regulatory framework, codified in the General Data Protection Regulation (GDPR) developed by the European Union that mandates stricter data protection practices for doing business with member countries and requires that handling and processing of personal data meet rigorous standards. This document illustrates how Intel offers security capabilities that start at boot protections embedded in silicon and extend all the way through the software stack which help protect data in each state: data in use, in transit, and at rest.
Categories: 
Security - Attestation, Compliance Mapping, Isoation, Data Sovereignty, Confidentiality, Geo Control, Intel® AES New Instructions (Intel® AES NI), Intel® Trusted Execution Technology (Intel® TXT), Intel® Software Guard Extensions (Intel® SGX)

This Solution Brief discusses new regulatory framework, codified in the General Data Protection Regulation (GDPR) developed by the European Union that mandates stricter data protection practices for doing business with member countries and requires that handling and processing of personal data meet rigorous standards. This document illustrates how Intel offers security capabilities that start at boot protections embedded in silicon and extend all the way through the software stack which help protect data in each state: data in use, in transit, and at rest.

Intel® Data Center Builders
Solutions Brief
Intel® Data Center Builders - Solutions Brief
Intel® Solid State Drive Data Center Family for PCIe*/NVMe and Storidge® ContainerIOTM enable high-performance containerized stateful application storage
Categories: 
Security - Recovery, Resilience

Intel® Solid State Drive Data Center Family for PCIe*/NVMe and Storidge® ContainerIOTM enable high-performance containerized stateful application storage

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
This Solution Brief explores how Red Hat OpenShift* Container Platform Deployable Solution Architecture (DSA) implements Red Hat’s enterprise-grade container application platform using Red Hat Ansible* enables customers to release new services to market faster, more efficiently, and at scale.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

This Solution Brief explores how Red Hat OpenShift* Container Platform Deployable Solution Architecture (DSA) implements Red Hat’s enterprise-grade container application platform using Red Hat Ansible* enables customers to release new services to market faster, more efficiently, and at scale.

Intel® Data Center Builders
Solution brief
Intel® Data Center Builders - Solution brief
Intel Select Solutions for Windows Server Software Defined Storage provide optimized performance on a fully tested stack—from the servers, CPU, memory, and storage to the firmware and software. That enables businesses to migrate to a hyperconverged infrastructure solution without spending weeks on researching and testing.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

Intel Select Solutions for Windows Server Software Defined Storage provide optimized performance on a fully tested stack—from the servers, CPU, memory, and storage to the firmware and software. That enables businesses to migrate to a hyperconverged infrastructure solution without spending weeks on researching and testing.