Reset Search
Keyword
BUILDERS PROGRAM

BUILDERS PROGRAM Reset

  • All
  • Attestation, Compliance Mapping, Isoation
  • Data Sovereignty, Confidentiality, Geo Control
  • Intel® AES New Instructions (Intel® AES NI)
  • Intel® Software Guard Extensions (Intel® SGX)
  • Intel® Trusted Execution Technology (Intel® TXT)
  • Recovery, Resilience
Attestation, Compliance Mapping, IsoationData Sovereignty, Confidentiality, Geo ControlIntel® AES New Instructions (Intel® AES NI)Intel® Software Guard Extensions (Intel® SGX) Intel® Trusted Execution Technology (Intel® TXT)Recovery, Resilience
Clear All
Intel® Data Center Builders
White paper
Intel® Data Center Builders - White paper
Anqlave Data Vault* (ADV*) helps solve the secret-management problem by allowing users to create, store, transport, and use secrets with improved security. ADV helps ensure that secrets are not available in plaintext, whether at rest, in motion, or in use. Secrets receive protection at rest and in motion using encryption, and they are used inside protected memory regions, called enclaves, which are created using Intel® Software Guard Extensions (Intel® SGX).
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

Anqlave Data Vault* (ADV*) helps solve the secret-management problem by allowing users to create, store, transport, and use secrets with improved security. ADV helps ensure that secrets are not available in plaintext, whether at rest, in motion, or in use. Secrets receive protection at rest and in motion using encryption, and they are used inside protected memory regions, called enclaves, which are created using Intel® Software Guard Extensions (Intel® SGX).

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
SoftLayer, and IBM Company, uses Intel® Trusted Execution Technology (Intel® TXT) to provide security controls to help ensure that your workloads are running on trusted hardware.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

SoftLayer, and IBM Company, uses Intel® Trusted Execution Technology (Intel® TXT) to provide security controls to help ensure that your workloads are running on trusted hardware.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
VeriClouds CredVerify uses Intel® Software Guard Extensions (Intel® SGX) to protect the sensitive credential verification process with hardware-based crypto built inside the CPU. The solution significantly advances the security of VeriClouds service.
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

VeriClouds CredVerify uses Intel® Software Guard Extensions (Intel® SGX) to protect the sensitive credential verification process with hardware-based crypto built inside the CPU. The solution significantly advances the security of VeriClouds service.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Analytics workloads benefit from extensive collaboration between Intel and Oracle, resulting in innovation and optimized data warehousing performance using Intel® Xeon® Scalable processors and Intel® Optane™ storage.
Categories: 
Security - Intel® AES New Instructions (Intel® AES NI)

Analytics workloads benefit from extensive collaboration between Intel and Oracle, resulting in innovation and optimized data warehousing performance using Intel® Xeon® Scalable processors and Intel® Optane™ storage.

Intel® Data Center Builders
Whitepaper
Intel® Data Center Builders - Whitepaper
This whitepaper describes Fortanix Runtime Encryption for Intel® SGX. Runtime Encryption transparently enables workloads to use Intel SGX enclaves for their cryptographic protection from rogue insiders, compromised OS, malware, and other vulnerabilities. To illustrate use cases for Runtime Encryption, a Self-Defending Key Management Service* (SDKMS) is described that delivers cloud-ready unified HSM and Key Management capabilities.
Categories: 
Security - Intel® Software Guard Extensions (Intel® SGX)

This whitepaper describes Fortanix Runtime Encryption for Intel® SGX. Runtime Encryption transparently enables workloads to use Intel SGX enclaves for their cryptographic protection from rogue insiders, compromised OS, malware, and other vulnerabilities. To illustrate use cases for Runtime Encryption, a Self-Defending Key Management Service* (SDKMS) is described that delivers cloud-ready unified HSM and Key Management capabilities.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
This Solution Brief discusses new regulatory framework, codified in the General Data Protection Regulation (GDPR) developed by the European Union that mandates stricter data protection practices for doing business with member countries and requires that handling and processing of personal data meet rigorous standards. This document illustrates how Intel offers security capabilities that start at boot protections embedded in silicon and extend all the way through the software stack which help protect data in each state: data in use, in transit, and at rest.
Categories: 
Security - Attestation, Compliance Mapping, Isoation, Data Sovereignty, Confidentiality, Geo Control, Intel® AES New Instructions (Intel® AES NI), Intel® Trusted Execution Technology (Intel® TXT), Intel® Software Guard Extensions (Intel® SGX)

This Solution Brief discusses new regulatory framework, codified in the General Data Protection Regulation (GDPR) developed by the European Union that mandates stricter data protection practices for doing business with member countries and requires that handling and processing of personal data meet rigorous standards. This document illustrates how Intel offers security capabilities that start at boot protections embedded in silicon and extend all the way through the software stack which help protect data in each state: data in use, in transit, and at rest.

Intel® Data Center Builders
Solutions Brief
Intel® Data Center Builders - Solutions Brief
Intel® Solid State Drive Data Center Family for PCIe*/NVMe and Storidge® ContainerIOTM enable high-performance containerized stateful application storage
Categories: 
Security - Recovery, Resilience

Intel® Solid State Drive Data Center Family for PCIe*/NVMe and Storidge® ContainerIOTM enable high-performance containerized stateful application storage

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
This Solution Brief explores how Red Hat OpenShift* Container Platform Deployable Solution Architecture (DSA) implements Red Hat’s enterprise-grade container application platform using Red Hat Ansible* enables customers to release new services to market faster, more efficiently, and at scale.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

This Solution Brief explores how Red Hat OpenShift* Container Platform Deployable Solution Architecture (DSA) implements Red Hat’s enterprise-grade container application platform using Red Hat Ansible* enables customers to release new services to market faster, more efficiently, and at scale.

Intel® Data Center Builders
Solution brief
Intel® Data Center Builders - Solution brief
Intel Select Solutions for Windows Server Software Defined Storage provide optimized performance on a fully tested stack—from the servers, CPU, memory, and storage to the firmware and software. That enables businesses to migrate to a hyperconverged infrastructure solution without spending weeks on researching and testing.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

Intel Select Solutions for Windows Server Software Defined Storage provide optimized performance on a fully tested stack—from the servers, CPU, memory, and storage to the firmware and software. That enables businesses to migrate to a hyperconverged infrastructure solution without spending weeks on researching and testing.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Proven configurations are within reach with Intel Select Solutions for VMWare vSAN, a verified foundation for hyper-converged infrastructure.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

Proven configurations are within reach with Intel Select Solutions for VMWare vSAN, a verified foundation for hyper-converged infrastructure.

Intel® Data Center Builders
Reference Architecture
Intel® Data Center Builders - Reference Architecture
This reference architecture describes: Intel and Microsoft hyperconverged compute and storage technologies. Function of hyperconverged infrastructure solution components Guidance for choosing hyperconverged solution components for specific situations.
Categories: 
Security - Intel® Trusted Execution Technology (Intel® TXT)

This reference architecture describes: Intel and Microsoft hyperconverged compute and storage technologies. Function of hyperconverged infrastructure solution components Guidance for choosing hyperconverged solution components for specific situations.

Intel® Data Center Builders
White Paper
Intel® Data Center Builders - White Paper
This implementation guide provides a starting point for Windows Server 2016 with Storage Spaces Direct (S2D) on the latest Intel technologies for software-defined storage solutions.
Categories: 
Security - Intel® AES New Instructions (Intel® AES NI)

This implementation guide provides a starting point for Windows Server 2016 with Storage Spaces Direct (S2D) on the latest Intel technologies for software-defined storage solutions.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
A well-designed virtualized cloud offers business decision makers incredible agility in terms of available resources for their workloads and data. Explore the advantages of building a trusted infrastructure with HyTrust, VMWare, IBM Cloud Softlayer, and Intel.
Categories: 
Security - Attestation, Compliance Mapping, Isoation, Data Sovereignty, Confidentiality, Geo Control, Intel® AES New Instructions (Intel® AES NI), Intel® Trusted Execution Technology (Intel® TXT), Recovery, Resilience , Intel® Software Guard Extensions (Intel® SGX)

A well-designed virtualized cloud offers business decision makers incredible agility in terms of available resources for their workloads and data. Explore the advantages of building a trusted infrastructure with HyTrust, VMWare, IBM Cloud Softlayer, and Intel.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
China Media and Broadcasting industry leverages Bigtera VirtualStor™ for Simplicity and Streamlining Business Processes.
Categories: 
Security - Intel® AES New Instructions (Intel® AES NI)

China Media and Broadcasting industry leverages Bigtera VirtualStor™ for Simplicity and Streamlining Business Processes.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Cloud infrastructures are built to be highly agile and dynamically assign resources to process workloads, including moving workloads across geographic boundaries.
Categories: 
Security - Attestation, Compliance Mapping, Isoation, Data Sovereignty, Confidentiality, Geo Control

Cloud infrastructures are built to be highly agile and dynamically assign resources to process workloads, including moving workloads across geographic boundaries. Because of this, cloud computing introduces new security risks and raises issues with visibility and control of both manual administrator actions as well as with automated / virtualized tasks. Intel, VMware, and HyTrust have collaborated extensively to create a solution that establishes trust for secure operations in the cloud. This solution resolves critical security challenges, provides a trusted foundation for virtualized workloads and storage; and enables compliance for data-location and privacy.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Hyperconverged infrastructure combines both compute and storage into a single building block. This is connected over what is now the standard in datacenter 10-gigabit Ethernet. The Nutanix Xtreme Computing Platform converges compute and storage-network resource pools (including Fibre Channel switches, etc.) into an easy-to-deploy, single, integrated appliance. Based on Intel® Xeon® processor-based architecture, this platform gives datacenters the flexibility to scale capacity, one node at a time, empowering IT managers to upgrade and expand at their own pace.
Categories: 
Security - Recovery, Resilience

Hyperconverged infrastructure combines both compute and storage into a single building block. This is connected over what is now the standard in datacenter 10-gigabit Ethernet. The Nutanix Xtreme Computing Platform converges compute and storage-network resource pools (including Fibre Channel switches, etc.) into an easy-to-deploy, single, integrated appliance. Based on Intel® Xeon® processor-based architecture, this platform gives datacenters the flexibility to scale capacity, one node at a time, empowering IT managers to upgrade and expand at their own pace.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
Businesses must consider information security, regulatory compliance, server geolocations, geo-fencing, and trust as they build their virtualized cloud infrastructures. HyTrust, VMware, and Intel have teamed to offer a cloud solution that enables IT and business leaders to build a trusted, securely governed, virtualized infrastructure upon a capability known as a hardware root-of-trust. The root-of-trust, which is enabled by Intel® Xeon® processors, provides a foundation on which the system’s other security elements can rely. With this solution, enterprises can increase the trust, security, and compliance of their IT infrastructure, while taking full advantage of the benefits of virtualization and the cloud.
Categories: 
Security - Data Sovereignty, Confidentiality, Geo Control, Intel® AES New Instructions (Intel® AES NI), Intel® Trusted Execution Technology (Intel® TXT)

Businesses must consider information security, regulatory compliance, server geolocations, geo-fencing, and trust as they build their virtualized cloud infrastructures. HyTrust, VMware, and Intel have teamed to offer a cloud solution that enables IT and business leaders to build a trusted, securely governed, virtualized infrastructure upon a capability known as a hardware root-of-trust. The root-of-trust, which is enabled by Intel® Xeon® processors, provides a foundation on which the system’s other security elements can rely. With this solution, enterprises can increase the trust, security, and compliance of their IT infrastructure, while taking full advantage of the benefits of virtualization and the cloud.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
This guide explains how to set up and deploy a trusted cloud solution on bare metal servers using elements from HyTrust, Intel, IBM Cloud SoftLayer, and VMware. The trusted cloud infrastructure is based on a combined solution provided by Intel Trusted Execution Technology (Intel TXT), SoftLayer base-metal servers, VMware virtualization and management applications, and HyTrust virtual appliances.
Categories: 
Security - Intel® AES New Instructions (Intel® AES NI), Intel® Trusted Execution Technology (Intel® TXT)

This guide explains how to set up and deploy a trusted cloud solution on bare metal servers using elements from HyTrust, Intel, IBM Cloud SoftLayer, and VMware. The trusted cloud infrastructure is based on a combined solution provided by Intel Trusted Execution Technology (Intel TXT), SoftLayer base-metal servers, VMware virtualization and management applications, and HyTrust virtual appliances.

Intel® Data Center Builders
Solution Brief
Intel® Data Center Builders - Solution Brief
This paper outlines a new way to think about a storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way a business operates.
Categories: 
Security - Intel® AES New Instructions (Intel® AES NI)

This paper outlines a new way to think about a storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way a business operates.