Trusted compute pools with Intel® Trusted Execution Technology (Intel® TXT)1 support IT compliance by protecting virtualized data centers’ private, public, and hybrid clouds against attacks toward hypervisor and BIOS, firmware, and other pre-launch software components.
A feature of the Intel® Xeon® processor, Intel TXT establishes a root of trust through measurements when the hardware and pre-launch software components are in a known good state. Utilizing the result, administrators can set policies for sensitive data and workload placement onto groups of servers known as trusted compute pools.
With Intel TXT, you can:
Imagine a piece of manufacturing or retail equipment becoming compromised—possibly manipulated via network, USB flash drive, or an illegal peripheral at boot time. Intel TXT measures and detects these and other manipulations. Using such measurements, systems can be kept from booting.
Have questions? Contact us >
1. Nenhum sistema de computador pode fornecer segurança absoluta sob todas as condições. A Intel® Trusted Execution Technology (Intel® TXT) requer um computador com a Tecnologia de Virtualização Intel®, um processador habilitado para Intel TXT, chipset, BIOS, Authenticated Code Modules (Módulos de código autenticados) e um ambiente MLE (Ambiente lançado medido) compatível com a Intel TXT. A Intel TXT também requer que o sistema contenha um TPM v1.s. Para obter mais informações, visite: http://www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html