• <Intel.com에 대한 자세한 내용
Masthead Light

Trusted Compute Pools with Intel® Trusted Execution Technology (Intel® TXT)

Enhance your server platform security

Hardware-based technology for enhancing platform security

Trusted compute pools with Intel® Trusted Execution Technology (Intel® TXT)1 support IT compliance by protecting virtualized data centers’ private, public, and hybrid clouds against attacks toward hypervisor and BIOS, firmware, and other pre-launch software components.

A feature of the Intel® Xeon® processor, Intel TXT establishes a root of trust through measurements when the hardware and pre-launch software components are in a known good state. Utilizing the result, administrators can set policies for sensitive data and workload placement onto groups of servers known as trusted compute pools.

Validating key component behavior at startup

Why it matters

With Intel TXT, you can:

  • Run your workload and data on a trusted server.
  • Protect your workload and data.
  • Avoid compromising security in the cloud.
  • Enhance IT compliance.
See solutions and products

Intel TXT works in conjunction with server systems based on the Intel Xeon processor and software stack installed on top of the server systems. 

See solutions and products incorporating Intel TXT from key industry leaders.

 

Intel® Trusted Execution Technology for Server Platforms

Available on eBook and paperback

Intel® Trusted Execution Technology for Server Platforms

This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter managers.
Book authors:
William FutralJames Greene

Available on: Amazon, Apress, Barnes and Noble

Building the Infrastructure for Cloud Security A Solutions View

Available on eBook and paperback

Building the Infrastructure for Cloud Security

A comprehensive look at the various facets of cloud security—infrastructure, network, services, compliance, and users.
Book authors:
Raghuram YeluriEnrique Castro-Leon

Available on: Amazon, ApressBarnes and Noble

 

Industrial and transaction systems

Industrial and transaction systems

Imagine a piece of manufacturing or retail equipment becoming compromised—possibly manipulated via network, USB flash drive, or an illegal peripheral at boot time. Intel TXT measures and detects these and other manipulations. Using such measurements, systems can be kept from booting.

Visit the Intel® Embedded Design Center to get additional developer-level details and view more industrial automation and retail technology solutions.

Have questions? Contact us >

추가 정보:

Intel® TXT white paper

Read more >

See how it works

Enlarge >

대화

제품 및 성능 정보

open

1. 어떠한 상황에서도 절대적인 보안을 제공하는 컴퓨터 시스템은 없습니다. 인텔® 신뢰 실행 기술(Intel® TXT)을 사용하려면 인텔® 가상화 기술, 인텔 TXT 지원 프로세서, 칩셋, BIOS, 인증 코드 모듈을 갖춘 컴퓨터 및 인텔 TXT 호환 측정 출시 환경(MLE)이 필요합니다. 인텔 TXT를 사용하려면 시스템에 TPM v1.s도 있어야 합니다. 자세한 내용은 www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html을 참조하십시오.