1 solution brief Cloud Computing Security in the Cloud Intel Xeon Processor E5-4600/2600/2400/1600 Intel Technologies Enable More Secure Business Computing in the Cloud Would you like to begin transforming your data center into a flexible, high-density private cloud that enables far more dynamic and automated control of systems and workloads? Would you like to use public cloud services to add capacity during peak demands? Like many businesses who are using the cloud, you ll find the efficiency, flexibility, and financial benefits of cloud strategies can benefit your business, yet you probably share the concerns of many other IT decision makers: namely, how can the security and privacy of sensitive data be ensured if it is being stored or processed on shared infrastructure, especially if that infrastructure is owned and managed by a third-party cloud provider?
2 Page 2 SECURITY IN THE CLOUD Intel has developed technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. These technologies lay the foundation needed for: Strong Data Protection. Encryption can be implemented pervasively to protect data both at rest and in transit, without compromising performance or driving up costs. Intel technology and open source contributions for protecting data include Intel Advanced Encryption Standard New Instructions 1 (Intel AES-NI) and the optimizations Intel has implemented with OpenSSL.* By accelerating both data encryption, as well as the initiation of secure sessions and transfer of the bulk data, you can better utilize data center resources and implement pervasive data protection without compromising the experience of your employees, customers, and partners. Trusted Infrastructure. Hardware can verify the integrity of key platform software to help protect against sophisticated launch time attacks and establish a control point for enhancing the security of virtualized workloads. Selected applications can be constrained to run only on these trusted pools of virtualized resources, to help protect critical assets more effectively. Trusted infrastructure technologies and software products include Intel Trusted Execution Technology 2 (Intel TXT), which establishes a server s root of trust to help assure system integrity, and Intel Identity Protection Technology 3 (Intel IPT) which validates legitimate users with two-factor authentication that executes directly on the PC. In addition, Intel Expressway Service Gateway (Intel ESG) is a highly scalable software appliance that provides enforcement points at a network s edge. It securely and reliably connects on-premise applications to external cloud providers, external business partners or employees, authenticating API requests against existing enterprise identity and access management systems. Security and Compliance Verification. The security environment of a cloud infrastructure can be more thoroughly monitored, assessed, and documented. With appropriate third-party applications, compliance can be verified dynamically to mitigate risk through unified, policy-based auditing, logging, and reporting. With these capabilities integrated into the foundation of your chosen cloud solution, you can take advantage of the extraordinary benefits of cloud computing, confident that your data is safer and more secure and your business is well-protected against today s increasingly sophisticated attacks. New Risks Require New Solutions New security issues arise in cloud environments while more traditional security issues continue to evolve. In a public or virtual private cloud, your data resides on a server physically controlled and managed by someone else, so traditional security models aimed at protecting the perimeter of the organization are no longer sufficient. Cloud computing shares some of these security dynamics with today s cross-business and cross-supply chain collaboration models, and it is vitally important to implement appropriate solutions for controlling access, detecting malware and intrusion, and protecting data in these environments. The growth of cloud computing has simply elevated these new security challenges, while at the same time, security issues continue to grow more and more complex. Attacks used to come primarily from individual hackers who were merely looking for personal fame or a fast profit. However, many of today s attacks are more stealthy, persistent, organized, and sophisticated. They target specific types of data and are designed to achieve and retain control of assets for financial gain. Regulatory environments are also changing. Businesses face increasing requirements for compliance, auditing, reporting, privacy protection, and indemnification, and the risks and costs of noncompliance are large and growing. To address these challenges, Intel has introduced a number of technologies in the Intel Xeon processor E5 family that help to enable comprehensive and verifiable security and compliance in cloud environments. With these technologies, Intel is providing a foundation to make cloud deployments suitable for increasingly sensitive and vital workloads.
3 SECURITY IN THE CLOUD Page 3 Business Requirementt Intel Technology Description Business Benefit Strong Data Security Intel Advanced Encryption Standard New Instructions (Intel AES-NI) 1 Reduces performance overhead to enable the pervasive use of encryption. Better protects the privacy and integrity of data, both at rest and as it moves through the cloud. Intel s advanced OpenSSL contributions: Intel s RSAX Accelerates SSL session initiation time. Intel s Function Stitching Interleaves instructions for the encryption and authentication processes of data transfer and executes them simultaneously for improved performance. Accelerates data encryption, as well as the initiation of secure sessions and transfer of the bulk data. Better utilize data center resources and implement pervasive data protection without compromising user productivity or efficiency. Trusted Infrastructure Intel Trusted Execution Technology (Intel TXT) 2 Can block launch if hypervisor or host software doesn t match known good states. Provides integrity-checking data that can be used for monitoring and verifying the platform trustworthiness. Enables trusted infrastructure and trusted compute pools to be established and maintained, and protects against new launchtime attacks. Intel Virtualization Technology 4 (Intel VT) Implements core virtualization processes in silicon to accelerate performance and improve workload isolation. Helps to ensure that data and applications are safely and securely isolated, even when residing on shared infrastructure. Intel VT FlexMigration (a part of Intel VT) Enables migration of running virtual machines among current and future Intel Xeon processorbased servers. In combination with Intel TXT, simplifies the migration of running applications onto new, trusted infrastructure. Intel Identity Protection Technology (Intel IPT) (on PCs and Ultrabooks with 3rd gen Intel Core i5 vpro and i7 vpro processors only) Provides two-factor authentication that executes directly on the PC. Gives IT managers more visibility into security at the endpoint and in the cloud, and aids in making risk and access decisions. Security and Compliance Verification Intel TXT (integrated with third-party SIEM and GRC security solutions) Provides hardware-based mechanisms that support monitoring of cloud security environments, with integrated auditing, logging, and reporting. Enables unified, policy-based verification of the security and compliance of the platform environment in clouds.
4 Page 4 SECURITY IN THE CLOUD Protecting Your Data Encryption is one of the most effective technologies available for protecting valuable information, but encrypting and decrypting data has traditionally required substantial computing power that can increase costs and slow down the performance of business applications. Intel Advanced Encryption Standards New Instructions 1 (Intel AES-NI) dramatically reduces this performance overhead by introducing new instructions to accelerate the compute-intensive steps of the AES algorithms. Because the Intel AES-NI hardware instructions also significantly reduce vulnerability to side-channel attacks, encryption is not just faster, but stronger, as well, as these types of attacks use software agents to analyze how a system processes data and searches for cache and memory access patterns to help deduce elements of the cryptographic processing and therefore make it easier to crack. Intel AES-NI helps hide critical elements such as table lookups, making it harder to determine what elements of crypto processing are happening. The result is that with Intel AES-NI, your data is not only encrypted faster, but is better protected, too. In addition, Intel has worked closely with OpenSSL,* an open-source, multi-platform security library that can be used to secure web transactions, to optimize implementations of cryptographic communications functions on Intel architecture. Software s use of the OpenSSL library produces impressive performance gains along with the hardware acceleration of Intel AES-NI. In fact, Intel AES-NI coupled with Intel s optimization of OpenSSL algorithms can accelerate AES encryption performance by over 8x, and speed decryption by an incredible 33x versus software-only approaches. 5, 6 Since Intel AES-NI is built into the processor s instruction set, it eliminates the need for costly security appliances or add-on cards. Businesses can implement encryption simply, cost-effectively, and pervasively to protect business data. Intel AES-NI is supported by many of today s leading software vendors to provide comprehensive data protection. Protection for Data in Transit. Secure banking transactions such as online bill pay, services like Gmail and Hotmail, and secure video streaming require complex processing, resulting in a stiff performance penalty and often causing security to be sacrificed to maintain responsiveness. Intel recognized that these operations have the potential for a high degree of parallelism and developed innovative software approaches to take advantage of that. Microsoft Windows Server* 2008 R2 with Internet Information Services and Red Hat Linux* openssl support Intel AES-NI. Intel s RSAX optimization to the OpenSSL RSA algorithm accelerates performance up to 1.55x. 5 This also improves the experience for users, while increasing the number of simultaneous secure sessions your Intel Xeon processor-based server can handle. 6 Protection for Data at Rest. Just because data is not in transit, does not mean it s secure. Encryption for data-at-rest on hard disks helps protect data from loss and theft, while facilitating decommissioning and repair. For example, if a damaged hard drive has unencrypted confidential information on it, sending it out for warranty repair could potentially expose its data. Microsoft, Checkpoint, McAfee, and PGP/ Symantec support Intel AES-NI to accelerate full-disk encryption. Protection for Data in Enterprise Applications. Oracle* and IBM* DB2* support Intel AES-NI in database tablespace encryption, and SAP* and Red Hat* JBoss* Enterprise Application Platform support Intel AES-NI in business operations. Hypervisor providers, such as Microsoft, VMware, Citrix, Oracle, and the open-source based hypervisors Xen and KVM, support AES-NI running in their guest applications. By taking advantage of the industry-leading solutions provided by these and other vendors supporting Intel AES-NI and OpenSSL optimizations, you can protect your data more effectively and implement cloud computing with greater confidence to deliver higher value to your business. Securing Your Infrastructure Migrating applications and workloads remains a manual process in many IT environments. Cloud computing can provide greater automation for moving running applications within and across data centers. This can make it easier to meet strict service-level agreements through load-balancing, failover, zero-downtime maintenance, and disaster recovery. However, if your data and applications are going to be moved, you must be certain they are moved into a secure infrastructure. Intel Trusted Execution Technology (Intel TXT) addresses this requirement in two key ways. Protection against Launch-time Attacks. Intel TXT ensures that the systems and software are able to launch only if they match a known good state. This protects against new launch-time attacks that could otherwise compromise the security environment of virtual infrastructure. Accurate Information for Verifying Security. Intel TXT provides information that can be used to monitor and assess the security environment. Software solution providers such as HyTrust, Parallels, and VMware are using the information generated by Intel TXT to help their customers establish and maintain trusted compute pools, so sensitive or business-critical workloads can be deployed and migrated with confidence. Intel Virtualization Technology (Intel VT) adds to these advantages. It helps to protect the integrity and confidentiality of data and applications by maintaining strong isolation among multiple workloads, even when they are running on shared infrastructure. Intel VT includes Intel VT FlexMigration, which enables live migration of running applications among multiple generations of Intel Xeon processor-based servers. Combined with Intel TXT, this can allow you to move your existing applications onto new, trusted infrastructure simply, reliably, and without downtime.
5 SECURITY IN THE CLOUD Page 5 Intel Identity Protection Technology (Intel IPT) 7 builds on security by further establishing trust to protect data at endpoints. Intel IPT validates legitimate users with two-factor authentication that executes directly on the PC, generating one-time passwords every 30 seconds from a tamper-proof, embedded token that operates in isolation from the operating system. There is also a certificate embedded in the chipset for hardware-based security that eliminates the additional cost of supporting traditional smart card or token storage options. Multiple authentication mechanisms supported by hardware provide IT managers with more visibility into security at the endpoint and in the cloud, which is useful in making risk and access decisions. Finally, it is crucial to protect applications as they are exposed to the cloud. Intel Expressway Service Gateway (Intel ESG) provides software enforcement points that sit at a network s edge by authenticating application programming interface (API) requests against existing enterprise identity and access management systems. With the APIlevel control of Intel ESG, you gain a measure of protection for your departmental and edge system infrastructure, and reduce the risk of content-born attacks on applications. As the number of social and enterprise APIs continue to explode, the Intel ESG helps you to scale consumption of cloud application services. Verifying Security and Compliance in Cloud Environments It s not enough to know your cloud infrastructure has the technology to provide a safe and secure environment for your data and applications. You need to be able to audit the security level of that environment to identify risks and verify compliance dynamically, whether your data resides in your own data center or in a public cloud infrastructure. Intel TXT provides the data needed for enhanced security and compliance auditing of virtual environments, and Intel is collaborating with leading security solution providers, such as RSA, to enable complete solutions. Specialized security management tools monitor and analyze the data provided by Intel TXT to provide visibility into the events and conditions that affect security. With these tools, you can verify compliance, identify risks, and respond quickly to mitigate them. Security Information and Event Management (SIEM) and Governance, Risk, and Compliance (GRC) software creates a general security control point by aggregating the event and information reports from various security applications and activities including Intel TXT. Aggregated information can be reported into a dashboard, indicating where security concerns, possible breaches, and gaps may reside. GRC software can also query infrastructure to make sure policies are active and in place. Administrators can use this information to create new or refine existing policies for the policy engine.
6 Page 6 SECURITY IN THE CLOUD Making the Cloud Work for You Intel Xeon processor-based servers provide the foundation for the industry s broadest ecosystem of cloud solutions. Intel AES-NI, Intel TXT, and Intel VT are built into the latest Intel Xeon processor E5 family to help address the security challenges inherent in cloud computing and make it easier for businesses to adopt cloud solutions. At the endpoint, PCs with Intel vpro technology 8 integrate hardwarebased, built-in features your IT personnel need to be proactive and responsive, and to keep your data safe. The technology is embedded in the hardware, so it is out of view and beyond the reach of malware, and able to deliver unprecedented PC security. This means you re better protected in the office and the data center. These technologies are a part of Intel s broader efforts to meet the challenges and reduce the risks that IT architects and managers face as the industry shifts toward cloud computing. Intel works directly with enterprise IT organizations and service providers throughout the world, and is a technical advisor to the Open Data Center Alliance, an independent organization of leading global IT managers. The Alliance is defining a roadmap of the highest priority usage models for cloud and next-generation data centers and is laying out the requirements to support them with multi-vendor, interoperable solutions that embrace standards. Intel uses this information to deliver products and technologies that meet these usage model requirements. Intel then engages and rallies leading systems and solution providers to deliver complementary products and solutions and to enable simpler, lower-risk deployment through reference architectures and best practices developed through the Intel Cloud Builders program. From building a cloud to finding a cloud services provider, Intel strives to make the cloud work for you. Intel Cloud Finder is an online resource that can simplify and shorten the selection process for cloud infrastructure service providers that match your requirements. At the highest level, you need to know if the cloud provider can provide evidence of data and platform protections for the services they provide. With Intel Cloud Finder, you can select cloud service providers based on a set of detailed criteria categorized by security, usability, quality, availability, technology, and business requirements. A search tool helps you identify which providers offer the services that are most important for your organization. Once you are comfortable that your criteria can be met, you can establish measurable, enforceable SLAs to provide ongoing verification.
7 SECURITY IN THE CLOUD Page 7 Moving Forward with Confidence Businesses have already begun integrating cloud computing into their IT strategies, and the adoption of cloud solutions will continue to accelerate in the months and years ahead. Intel is at the heart of this evolution and provides industry-leading technology advancements on the world s most widely deployed server architecture. With Intel as the foundation of your cloud solutions, you can be confident that your data is safer and more secure, so you can move into the cloud with greater confidence. Learn More For more information about Intel cloud computing resources, visit: For more information about Intel security technologies, visit: For more information about Intel TXT, visit: For more information about Intel AES-NI, visit: For more information about which software providers support Intel AES-NI and Intel s OpenSSL optimizations, visit: For more information about Intel Virtualization Technology, visit: For more information about Intel vpro technology, visit: For more information about Intel Identity Protection Technology, visit: identity-protection/identity-protection-technology-general.html For more information about Open Data Center Alliance, visit: For more information about Intel Cloud Finder, visit:
8 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to 1. Intel AES-NI requires a computer system with an AES-NI enabled processor, as well as non-intel software to execute the instructions in the correct sequence. AES-NI is available on Intel Core i5-600 Desktop Processor Series, Intel Core i7-600 Mobile Processor Series, and Intel Core i5-500 Mobile Processor Series. For availability, consult your reseller or system manufacturer. For more information, see 2. No computer system can provide absolute security under all conditions. Intel Trusted Execution Technology (Intel TXT) requires a computer system with Intel Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit 3. No system can provide absolute security under all conditions. Requires an Intel IPT enabled system, including a 2nd generation Intel Core processor, enabled chipset, firmware, and software. Available only on participating websites. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit ipt.intel.com. 4. Intel Virtualization Technology requires a computer system with an enabled Intel processor, BIOS, virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit 5. Intel s cryptographic optimizations speed up the handshake and the bulk data transfer phases of OpenSSL. The performance gains were measured on a dual Intel Xeon Processor X5680  system, which consists of two 6-core Intel processors based on the 32-nm microarchitecture, supporting the Intel AES New Instructions (Intel AES-NI) extension. We measured the performance gains for OpenSSL using the built-in speed test, as well as at the system-level running an Apache web server sending HTTP over SSL to clients on a network. 6. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Configurations:OpenSSL versions 1.0.0d and a snapshot of the upcoming version containing all of Intel s cryptographic optimizations; Apache version httpd ; Intel Xeon Processor X5680 EP with two processors (3.3 GHz, 12M Cache, 6.40 GT/s Intel QPI). For more information go to 7. No system can provide absolute security under all conditions. Requires an Intel Identity Protection Technology-enabled system, including a 2nd gen Intel Core processor enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit ipt.intel.com. 8. PCs with Intel vpro processor technology include Intel Active Management Technology (Intel AMT). Intel Active Management Technology requires the computer system to have an Intel AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes. For more information, see Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web Site Copyright 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. 1012/JRR/HBD/PDF US
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
JANUARY 2013 Industry Brief Securing the Cloud for Financial Institutions An Overview of Cloud Security Issues Facing the Financial Services Industry and Intel Technologies for Securing the Financial Cloud
Chapter 1 of 5 Control your corner of the cloud. From the halls of government to the high-rise towers of the corporate world, forward-looking organizations are recognizing the potential of cloud computing
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software
JANUARY 2013 Industry Brief Healthcare Cloud Security An Overview of Cloud Security Issues Facing Healthcare Organizations and Intel Technologies for Securing the Healthcare Cloud Why You Should Read This
Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and
Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not
A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations
Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Agenda Intel + McAfee: What it means Computing trends and security
Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online
JANUARY 2013 Industry Brief Securing the Cloud for Government Entities An Overview of Cloud Security Issues Facing Governmental Organizations and Intel Technologies for Securing the Government Cloud Why
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge
SOLUTION BLUEPRINT IT SECURITY MANAGEMENT McAfee epolicy Orchestrator * Deep Command * Industry IT security management across industries Business Challenge Comprehensive security management solution allowing
The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
SEPTEMBER 2011 Planning Guide Cloud Security Seven Steps for Building Security in the Cloud from the Ground Up Why you should read this document: This guide provides practical information to help you integrate
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Open Source on Intel white paper OpenStack* Intel Xeon processors Intel Trusted Execution Technology Intel Advanced Encryption Standard New Instructions Mechanisms to Protect Data in the Open Cloud Intel
Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report 7904 - Trusted Geolocation in the Cloud: Proof of Concept Implementation Trusted Geolocation in the Cloud Business Business
Health & Life sciences breach security program David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences Overview 1. Healthcare Security Research / Directions 2. Healthcare
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
Leading Virtualization 2.0 How Intel is driving virtualization beyond consolidation into a solution for maximizing business agility within the enterprise White Paper Intel Virtualization Technology (Intel
WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and
WHITE PAPER Intel Identity Protection Technology Deeper Levels of Security with Intel Identity Protection Technology This technology is something you can take advantage of if your web site has a portal
Product Brief Intel Xeon Processor E3-1200 Product Family Small Business Servers Intel Xeon Processor E3-1200 Product Family A new generation of processors for small business servers Servers based on the
White Paper Intel Ethernet Multi-Port Server Adapters Using Multi-Port Intel Ethernet Server Adapters to Optimize Server Virtualization Introduction As enterprise-class server infrastructures adopt virtualization
Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness
整合 ICT 技術打造綠色智慧節能航空城 李國輝亞太區 ICT 解決方案架構師 Intel Corp Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
2nd to 4th Generation Intel Core vpro Processor Family eration Intel Core vpro processors are designed to strengthen security and increase productivity for you and your users. Embedded hardware technologies
PC Solutions That Mean Business Desktop and notebook PCs for small business Powered by the Intel Core 2 Duo Processor The Next Big Thing in Business PCs The Features and Performance to Drive Business Success
Imagine What Fitness Can Look Like in the Future Take a glimpse into tomorrow s digital health club. Imagine a future where technology is seamlessly integrated into the fitness experience from the time
SOLUTION BRIEF Hardware-based Security Solutions Healthcare Information Security Healthcare Security: User Experience, Compliance, and Risk David Houlding, CISSP, CIPP Healthcare Privacy and Security Lead
white paper Intel Trusted Execution Technology Intel Trusted Execution Technology Hardware-based Technology for Enhancing Server Platform Security Executive Summary A building is only as good as its foundation.
Dell Client Systems Take Control of Your Environment Powered by Intel Core 2 processor with vpro technology Simplifying IT As IT infrastructures grow, heterogeneous environments expand. Growing infrastructures
SMB PLANNING GUIDE Modernizing Servers and Software Increase Performance with Intel Xeon Processor E3 v3 Family Servers and Windows Server* 2012 R2 Software Why You Should Read This Document This planning
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
Real-Time Big Data Analytics with the Intel Distribution for Apache Hadoop software Executive Summary is already helping businesses extract value out of Big Data by enabling real-time analysis of diverse
The Innovative Lenovo ThinkCentre M92p Tiny Tiny is the new BIG: Why go thin when you can go Tiny Introduction The Lenovo ThinkCentre M92p Tiny is an innovative new desktop PC. It is based on the 3rd Generation
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness
The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure
Dubrovnik, Croatia, South East Europe 20-22 May, 2013 Big Data Value, use cases and architectures Petar Torre Lead Architect Service Provider Group 2011 2013 Cisco and/or its affiliates. All rights reserved.
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Overcoming the Security Challenges of the Cloud Best Practices for Keeping Your Data and Your Organization Safe 1.800.800.0014 www.pcconnection.com 2013 PC Connection, Inc. All rights reserved. PC Connection
Cloud Computing Big Data High Performance Computing Intel Corporation copy right 2013 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.
Secure Mobile Computing Mark Blatt MD Director Global HealthCare Strategy Intel Corporation January 2011 Breaches Cost the Enterprise Risks are Growing, Costs are Increasing Prevention the Best Solution
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
3rd to 5th Generation Intel Core vpro Processor Family eration Intel Core vpro processor-based devices are designed to meet the mobility needs of your users and the security requirements of your enterprise.
A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS June 2011 WHITE PAPER 2011 VCE Company LLC, All rights reserved. 1 Table of Contents Executive Overview... 3
White Paper Server Virtualization on Intel Architecture Enhanced Virtualization on Intel Architecturebased Servers Improve Utilization, Manage Change, Reduce Costs Server virtualization on Intel processor-based
Cisco and Red Hat: Application Centric Infrastructure Integration with OpenStack Cisco and Red Hat Extend the Cisco ACI Policy Framework to Red Hat Enterprise Linux OpenStack Platform Enabled Environments
Hur hanterar vi utmaningar inom området - Big Data Jan Östling Enterprise Technologies Intel Corporation, NER Legal Disclaimers All products, computer systems, dates, and figures specified are preliminary
Intel Virtualization Technology (VT) in Converged Application Platforms Enabling Improved Utilization, Change Management, and Cost Reduction through Hardware Assisted Virtualization White Paper January
Accelerating Enterprise Big Data Success Tim Stevens, VP of Business and Corporate Development Cloudera 1 Big Opportunity: Extract value from data Revenue Growth x = 50 Billion 35 ZB Cost Savings Margin
Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual
White Paper TRUSTED WORKLOAD MIGRATION WITH EMC, RSA, INTEL, AND HYTRUST Nondisruptive trusted workload migration between data centers Active enforcement of hardware-level security policy compliance Enhanced
IBM and VMware virtualization benefits for mid-sized businesses April 2009 April 2009 Virtualization strategy for mid-sized businesses Reduce cost, improve service and manage risk with virtualization Virtualization
Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History
Life With Big Data and the Internet of Things Jim Fister Lead Strategist, Director of Business Development firstname.lastname@example.org www.linkedin.com/pub/jim-fister/0/3/aa/ Preston Walters Director, Business
White Paper Vinodh Gopal Jim Guilford Erdinc Ozturk Sean Gulley Wajdi Feghali IA Architects Intel Corporation Improving OpenSSL* Performance October 2011 326232-001 Executive Summary The SSL/TLS protocols
White Paper The Benefits of Virtualizing Citrix XenApp with Citrix XenServer This white paper will discuss how customers can achieve faster deployment, higher reliability, easier management, and reduced
Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Family-Based Platforms Executive Summary Complex simulations of structural and systems performance, such as car crash simulations,
Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Intel delivers flexible, end-to-end data protection for retail point-of-sale transactions any device, anywhere, anytime.
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Solution Recipe: Improve Networked PC Security with Intel vpro Technology Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 email@example.com
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial