Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration

Size: px
Start display at page:

Download "Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration"

Transcription

1 SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge End the breach of con dential corporate or customer data, which can result in loss of intellectual property, industry and legal noncompliance penalties, and more Technology Solution McAfee Endpoint Encryption Software with Intel AES New Instructions (Intel AES-NI) Enterprise Hardware Platform Intel Core processor family

2 BUSINESS AND SOLUTION DETAILS MEETING MARKETPLACE DEMANDS Organizations are under increasing pressure to protect sensitive data and minimize the risk of data breaches. Global regulations protecting personally identi able information (PII) are becoming more stringent and breaches more costly to organizations that fail to comply. In addition, valuable intellectual property (IP) that holds competitive advantage is also under risk of loss, theft, or unauthorized access. Solution Blueprint: Enhancing McAfee Endpoint Encryption Software With Intel AES-NI Hardware- Based Acceleration Encryption is one of the best solutions to protect valuable data on endpoints by making the encrypted data unreadable by unauthorized parties. McAfee and Intel optimize full-disk encryption by adding hardware-based acceleration to softwarebased encryption. This gives organizations the bene ts of both increased performance and security. BUSINESS CHALLENGE If organizations have valuable IP- and/or compliance-related data, it s a target for theft. Laptop computers have historically been a major source of sensitive data loss and leakage due to the mobility, large storage capacity, and database access capabilities of PCs. To help protect the vast amounts of digital data on these endpoints, companies deploy managed full-disk encryption to automatically secure all data on the laptop from unauthorized access. Intellectual capital (e.g., patented technology, trade secrets, and proprietary data) makes up a majority of a company s value, so it makes sense to protect access to it, especially on mobile endpoints. For compliance-related data, when a PC with managed encryption is lost or stolen, it s generally not considered to be a breach event because the data is unusable, unreadable, or indecipherable to unauthorized individuals. Without encryption or proof of protection through managed encryption, the biggest security concern is the possibility of a data breach. The breach of con dential corporate or customer data can result in loss of intellectual property, industry and legal noncompliance penalties, and more. SOLUTION OVERVIEW Intel AES-NI acceleration speeds all AES encryption operations, making full-disk encryption even faster. Working with McAfee Endpoint Encryption for PCs, which has unique native support for Intel AES-NI, provides key bene ts: Reduced end user logon times Faster resume from hibernate Faster initial hard disk encryption Decreased file save times 2

3 Encryption with Intel AES-NI Standard Encryption No Encryption Users can feel the speed bene- ts provided by Intel AES-NI during everyday activities like resuming from hibernation (Figure 1). Time (Seconds) Figure 1. Resume from Hibernate (HDD) Times TECHNOLOGY McAfee Endpoint Encryption for PCs protects valuable data on laptop and desktop computers with full-disk encryption and strong access control. McAfee epolicy Orchestrator* provides robust, centralized management and proof of protection. From a single console, McAfee epolicy Orchestrator delivers centralized deployment and management, shared policies, policy administration, password recovery, monitoring, auditing, reporting, and proof of protection. McAfee epolicy Orchestrator is also the same management infrastructure for a wide range of McAfee data protection, endpoint, and security solutions. This provides customers with ease of management, consistent protection, and lower TCO. McAfee and Intel optimize full disk encryption by adding hardware-based Intel AES-NI acceleration to McAfee software-based encryption. SOLUTION ARCHITECTURE Intel AES-NI is built into the processor. McAfee Endpoint Encryption for PCs automatically detects its presence and uses it if it is available. No configuration is required by the end user or the administrator. Intel AES-NI is a set of new instructions included in the Intel Core processor family (codenamed Westmere) or newer. This speeds up execution of the AES encryption/decryption algorithms. To be clear, Intel AES-NI doesn t implement the entire AES application. Instead, it accelerates just parts of it. This is important for legal classi cation purposes because encryption is a controlled technology in many countries. Intel AES-NI adds six new AES instructions, four for encryption and decryption, one for the mix column, and one for generating next-round text. These instructions speed up the AES operations in the rounds of transformation and assist in the generation of the round keys. Intel AES-NI also includes a seventh new instruction: CLMUL. This instruction could speed up the AES- GCM and binary elliptical curve cryptography (ECC) and assists in error correcting codes, general-purpose cyclic redundancy checks (CRCs), and data de-duplication. It particularly helps in carryless multiplication, also known as binary polynomial multiplication. This is the mathematical operation of computing the product of two operands without generating or propagating carries. Such multiplica- 3

4 tions are an essential step in computing multiplications in binary Galois elds. Intel AES-NI includes Intel s carryless multiplication instruction. Algorithms can use CLMUL to compute the Galois Hash, the underlying computation of the GCM. CLMUL speeds up execution of GCM by computing the carryless multiplication of two 64-bit operands. Figure 2. Physical Implementation Figure 2 shows four of the new instructions at work encrypting and decrypting rounds from a 128-bit plain text to 128-bit cipher text and vice versa. During each round, there are two instructions that assist in generating the follow-on key. The AESENC instruction encrypts each round and AESENCLAST encrypts the last round. In reverse (decryption), AESDEC decrypts each round and AESDECLAST decrypts the last round. Another instruction, AESIMC, does the mix column operation for each round and AESKEYGENASSIST generates the next key. The keys can be 128-, 192-, or 256-bit. Remember, all these computations are being done by the hardware, providing a signi cant speedup: 4x in CBC encrypt in serial mode and more than 14x in parallel modes of operation. Besides the performance bene t of Intel AES-NI, its execution of instructions in hardware provides some additional security in helping to prevent software side-channel attacks. Software side channels are vulnerabilities in the software implementation of cryptographic algorithms. They emerge in multiple processing environments (multiple cores, threads, or operating systems). Cache-based, software side-channel attacks exploit the fact that software-based AES has encryption blocks, keys, and lookup tables held in memory. In a cache collision-timing, side-channel attack, a piece of malicious code 4

5 running on the platform could seed the cache, run cryptographic operations, and then time speciallycrafted memory accesses to identify changes in the cache. From these changes, the attack could determine portions of the cryptographic key value. For example, by measuring the time it takes for a given cryptographic operation, an attacker might be able to determine that the uppermost bit of a key is a 0. Knowing that, single-bit cuts in half the key space that must be searched to identify the complete key value. More effective side-channel attacks reduce the key space signi cantly (i.e., they may identify half the bits in the key). Since Intel AES-NI is hardware based, it has no need for lookup tables and the encryption blocks are executed in hardware within the microprocessor. This enables implementations of AES that use Intel AES-NI to address software side-channel attacks. These instructions also make AES simple to implement, with reduced code size. This helps to reduce the risk of inadvertently introducing security aws such as hard-to-detect side channel leaks. Also, the acceleration provided by Intel AES-NI can allow the system to execute larger key sizes, making data transfers more secure. MARKET SEGMENT AND VALUE PROPOSITION Every company needs encryption to protect IP- or compliance-related data. Generally, companies that are externally required to protect compliance data (e.g., nancial, customer or employee data) are a good place to start. Companies with valuable IP like proprietary data and patents also need encryption. Endpoint encryption is most often handled by chief information security of cer (CISO) and chief information of cer (CIO) organizations. These organizations report into senior-level executives who focus on data security and compliance on endpoints within an organization. McAfee Endpoint Encryption for PCs prevents unauthorized access and renders sensitive data unreadable and useless in the event of device loss or theft. Most companies don t want to use encryption but to protect business data, they must. That s why it s important to provide organizations with high-performance encryption that s easy to use and manage. MORE INFORMATION To learn more about Intel AES-NI, visit To learn more about McAfee Endpoint Encryption, visit 5

6 Sources: Securing the Enterprise with Intel AES-NI (Intel Corporation, March 2010). McAfee, Inc. Endpoint Encryption Delivers True Common Management for Endpoint Security and Data Protection (McAfee Corporation, October7, 2009). McAfee Endpoint Encryption (McAfee Corporation, 2011). Intel AES-NI requires a computer system with an AES-NI enabled processor, as well as non-intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel processors. For availability, consult your reseller or system manufacturer. For more information, see Intel, Intel Core, and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright 2011 Intel Corporation INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTH- ERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABIL- ITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to speci cations and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "unde ned". Intel reserves these for future de nition and shall have no responsibility whatsoever for con icts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not nalize a design with this information. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using speci c computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published speci cations. Current characterized errata are available on request. Contact your local Intel sales of ce or your distributor to obtain the latest speci cations and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or go to: /SS/PDF

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Breakthrough AES Performance with. Intel AES New Instructions

Breakthrough AES Performance with. Intel AES New Instructions White Paper Breakthrough AES Performance with Intel AES New Instructions Kahraman Akdemir, Martin Dixon, Wajdi Feghali, Patrick Fay, Vinodh Gopal, Jim Guilford, Erdinc Ozturk, Gil Wolrich, Ronen Zohar

More information

Implementation and Performance of AES-NI in CyaSSL. Embedded SSL

Implementation and Performance of AES-NI in CyaSSL. Embedded SSL Implementation and Performance of AES-NI in CyaSSL Embedded SSL In 2010, Intel introduced the 32nm Intel microarchitecture code name Westmere. With this introduction, Intel announced support for a new

More information

Haswell Cryptographic Performance

Haswell Cryptographic Performance White Paper Sean Gulley Vinodh Gopal IA Architects Intel Corporation Haswell Cryptographic Performance July 2013 329282-001 Executive Summary The new Haswell microarchitecture featured in the 4 th generation

More information

Intel Media SDK Library Distribution and Dispatching Process

Intel Media SDK Library Distribution and Dispatching Process Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media

More information

Fast, Low-Overhead Encryption for Apache Hadoop*

Fast, Low-Overhead Encryption for Apache Hadoop* Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software

More information

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide Opal* Compatibility Guide 1.0 Order Number: 331049-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL

More information

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp. Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not

More information

Cloud based Holdfast Electronic Sports Game Platform

Cloud based Holdfast Electronic Sports Game Platform Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online

More information

Intel SSD 520 Series Specification Update

Intel SSD 520 Series Specification Update Intel SSD 520 Series Specification Update June 2012 Revision 1.0 Document Number: 327567-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

McAfee epolicy Orchestrator * Deep Command *

McAfee epolicy Orchestrator * Deep Command * SOLUTION BLUEPRINT IT SECURITY MANAGEMENT McAfee epolicy Orchestrator * Deep Command * Industry IT security management across industries Business Challenge Comprehensive security management solution allowing

More information

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To

More information

The ROI from Optimizing Software Performance with Intel Parallel Studio XE

The ROI from Optimizing Software Performance with Intel Parallel Studio XE The ROI from Optimizing Software Performance with Intel Parallel Studio XE Intel Parallel Studio XE delivers ROI solutions to development organizations. This comprehensive tool offering for the entire

More information

Executive Summary. Introduction. WHITE PAPER Proof of Concept: Data Encryption

Executive Summary. Introduction. WHITE PAPER Proof of Concept: Data Encryption WHITE PAPER Proof of Concept: Data Encryption Increasing Security by Accelerating Data Encryption with Intel Advanced Encryption Standard New Instructions (Intel AES-NI): Testing by DuPont and Intel Corporation

More information

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Document Number: 324818-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intel Service Assurance Administrator. Product Overview

Intel Service Assurance Administrator. Product Overview Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an

More information

with PKI Use Case Guide

with PKI Use Case Guide Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

opportunity Mechanisms to Protect Data in the Open Cloud

opportunity Mechanisms to Protect Data in the Open Cloud Open Source on Intel white paper OpenStack* Intel Xeon processors Intel Trusted Execution Technology Intel Advanced Encryption Standard New Instructions Mechanisms to Protect Data in the Open Cloud Intel

More information

Benefits of Intel Matrix Storage Technology

Benefits of Intel Matrix Storage Technology Benefits of Intel Matrix Storage Technology White Paper December 2005 Document Number: 310855-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

Intel Platform and Big Data: Making big data work for you.

Intel Platform and Big Data: Making big data work for you. Intel Platform and Big Data: Making big data work for you. 1 From data comes insight New technologies are enabling enterprises to transform opportunity into reality by turning big data into actionable

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Intel Solid-State Drives Increase Productivity of Product Design and Simulation

Intel Solid-State Drives Increase Productivity of Product Design and Simulation WHITE PAPER Intel Solid-State Drives Increase Productivity of Product Design and Simulation Intel Solid-State Drives Increase Productivity of Product Design and Simulation A study of how Intel Solid-State

More information

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture White Paper Intel Xeon processor E5 v3 family Intel Xeon Phi coprocessor family Digital Design and Engineering Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture Executive

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

Accelerating Business Intelligence with Large-Scale System Memory

Accelerating Business Intelligence with Large-Scale System Memory Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness

More information

How To Reduce Pci Dss Scope

How To Reduce Pci Dss Scope WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

Accelerating Business Intelligence with Large-Scale System Memory

Accelerating Business Intelligence with Large-Scale System Memory Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness

More information

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software Real-Time Big Data Analytics with the Intel Distribution for Apache Hadoop software Executive Summary is already helping businesses extract value out of Big Data by enabling real-time analysis of diverse

More information

The Case for Rack Scale Architecture

The Case for Rack Scale Architecture The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage

More information

* * * Intel RealSense SDK Architecture

* * * Intel RealSense SDK Architecture Multiple Implementations Intel RealSense SDK Architecture Introduction The Intel RealSense SDK is architecturally different from its predecessor, the Intel Perceptual Computing SDK. If you re a developer

More information

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations

More information

Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Intel Xeon Processor E7 v2 Family-Based Platforms

Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Intel Xeon Processor E7 v2 Family-Based Platforms Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Family-Based Platforms Executive Summary Complex simulations of structural and systems performance, such as car crash simulations,

More information

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Intel delivers flexible, end-to-end data protection for retail point-of-sale transactions any device, anywhere, anytime.

More information

Intel Desktop Board D945GCPE Specification Update

Intel Desktop Board D945GCPE Specification Update Intel Desktop Board D945GCPE Specification Update Release Date: July 11, 2007 Order Number: E11670-001US The Intel Desktop Board D945GCPE may contain design defects or errors known as errata, which may

More information

Intel Desktop Board DP55WB

Intel Desktop Board DP55WB Intel Desktop Board DP55WB Specification Update July 2010 Order Number: E80453-004US The Intel Desktop Board DP55WB may contain design defects or errors known as errata, which may cause the product to

More information

Intel Desktop Board D945GCPE

Intel Desktop Board D945GCPE Intel Desktop Board D945GCPE Specification Update January 2009 Order Number: E11670-003US The Intel Desktop Board D945GCPE may contain design defects or errors known as errata, which may cause the product

More information

Scaling Networking Solutions for IoT Challenges and Opportunities

Scaling Networking Solutions for IoT Challenges and Opportunities Scaling Networking Solutions for IoT Challenges and Opportunities Anil Kumar, Intel. Santa Clara, CA USA April 2015 1 Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

iscsi Quick-Connect Guide for Red Hat Linux

iscsi Quick-Connect Guide for Red Hat Linux iscsi Quick-Connect Guide for Red Hat Linux A supplement for Network Administrators The Intel Networking Division Revision 1.0 March 2013 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH

More information

How To Get A New Computer For Your Business

How To Get A New Computer For Your Business Selling Security to SMBs with 4 th gen Intel Core Processors 1 After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is

More information

A Superior Hardware Platform for Server Virtualization

A Superior Hardware Platform for Server Virtualization A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations

More information

Intel Desktop Board DG41BI

Intel Desktop Board DG41BI Intel Desktop Board DG41BI Specification Update July 2010 Order Number: E88214-002US The Intel Desktop Board DG41BI may contain design defects or errors known as errata, which may cause the product to

More information

Intel Desktop Board DG43RK

Intel Desktop Board DG43RK Intel Desktop Board DG43RK Specification Update December 2010 Order Number: E92421-003US The Intel Desktop Board DG43RK may contain design defects or errors known as errata, which may cause the product

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and

More information

New Dimensions in Configurable Computing at runtime simultaneously allows Big Data and fine Grain HPC

New Dimensions in Configurable Computing at runtime simultaneously allows Big Data and fine Grain HPC New Dimensions in Configurable Computing at runtime simultaneously allows Big Data and fine Grain HPC Alan Gara Intel Fellow Exascale Chief Architect Legal Disclaimer Today s presentations contain forward-looking

More information

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First

More information

Specification Update. January 2014

Specification Update. January 2014 Intel Embedded Media and Graphics Driver v36.15.0 (32-bit) & v3.15.0 (64-bit) for Intel Processor E3800 Product Family/Intel Celeron Processor * Release Specification Update January 2014 Notice: The Intel

More information

Intel Desktop Board DP43BF

Intel Desktop Board DP43BF Intel Desktop Board DP43BF Specification Update September 2010 Order Number: E92423-004US The Intel Desktop Board DP43BF may contain design defects or errors known as errata, which may cause the product

More information

Intel Desktop Board DG41TY

Intel Desktop Board DG41TY Intel Desktop Board DG41TY Specification Update July 2010 Order Number E58490-006US The Intel Desktop Board DG41TY may contain design defects or errors known as errata, which may cause the product to deviate

More information

Intel Desktop Board DG31PR

Intel Desktop Board DG31PR Intel Desktop Board DG31PR Specification Update July 2010 Order Number: E30564-007US The Intel Desktop Board DG31PR may contain design defects or errors known as errata, which may cause the product to

More information

Intel RAID RS25 Series Performance

Intel RAID RS25 Series Performance PERFORMANCE BRIEF Intel RAID RS25 Series Intel RAID RS25 Series Performance including Intel RAID Controllers RS25DB080 & PERFORMANCE SUMMARY Measured IOPS surpass 200,000 IOPS When used with Intel RAID

More information

Intel Desktop Board DG965RY

Intel Desktop Board DG965RY Intel Desktop Board DG965RY Specification Update May 2008 Order Number D65907-005US The Intel Desktop Board DG965RY contain design defects or errors known as errata, which may cause the product to deviate

More information

Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum

Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum July 2012 Document Number: 327705-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intelligent Business Operations

Intelligent Business Operations White Paper Intel Xeon Processor E5 Family Data Center Efficiency Financial Services Intelligent Business Operations Best Practices in Cash Supply Chain Management Executive Summary The purpose of any

More information

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History

More information

Intel Network Builders

Intel Network Builders Intel Network Builders Nakina Systems Solution Brief Intel Xeon Processors Intel Network Builders Nakina Systems and Intel Make NFV Network Operational Introduction Every great generation of computing

More information

Intel Media Server Studio Professional Edition for Windows* Server

Intel Media Server Studio Professional Edition for Windows* Server Intel Media Server Studio 2015 R3 Professional Edition for Windows* Server Release Notes Overview What's New System Requirements Installation Installation Folders Known Limitations Legal Information Overview

More information

Secure Mobile. Mark Blatt MD Global HealthCare Strategy Intel Corporation January 2011

Secure Mobile. Mark Blatt MD Global HealthCare Strategy Intel Corporation January 2011 Secure Mobile Computing Mark Blatt MD Director Global HealthCare Strategy Intel Corporation January 2011 Breaches Cost the Enterprise Risks are Growing, Costs are Increasing Prevention the Best Solution

More information

Intel Data Migration Software

Intel Data Migration Software User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

CLOUD SECURITY: Secure Your Infrastructure

CLOUD SECURITY: Secure Your Infrastructure CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. Agenda Intel + McAfee: What it means Computing trends and security

More information

DDR2 x16 Hardware Implementation Utilizing the Intel EP80579 Integrated Processor Product Line

DDR2 x16 Hardware Implementation Utilizing the Intel EP80579 Integrated Processor Product Line Utilizing the Intel EP80579 Integrated Processor Product Line Order Number: 320296-002US Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intel Desktop Board DQ965GF

Intel Desktop Board DQ965GF Intel Desktop Board DQ965GF Specification Update October 2008 Order Number: D65914-005US The Intel Desktop Board DQ965GF may contain design defects or errors known as errata, which may cause the product

More information

Intel Matrix Storage Console

Intel Matrix Storage Console Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,

More information

Intel Desktop Board DQ43AP

Intel Desktop Board DQ43AP Intel Desktop Board DQ43AP Specification Update July 2010 Order Number: E69398-005US The Intel Desktop Board DQ43AP may contain design defects or errors known as errata, which may cause the product to

More information

McAfee and SAP HANA. Executive Summary. Real-Time Business Requires Real-Time Security

McAfee and SAP HANA. Executive Summary. Real-Time Business Requires Real-Time Security White Paper SAP HANA Intel Xeon Processor E7 Family Enterprise-class Security McAfee and SAP HANA Real-time, data-driven business with enterprise-class security Executive Summary There s an old saying:

More information

Intel Matrix Storage Manager 8.x

Intel Matrix Storage Manager 8.x Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition

AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition Directions in Authenticated Ciphers DIAC 2013, 11 13 August 2013, Chicago, USA AES-GCM software performance on the current high end CPUs as a performance baseline for CAESAR competition Shay Gueron University

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013 Legal Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

Intel Desktop Board DG41WV

Intel Desktop Board DG41WV Intel Desktop Board DG41WV Specification Update April 2011 Part Number: E93639-003 The Intel Desktop Board DG41WV may contain design defects or errors known as errata, which may cause the product to deviate

More information

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA) Intel HTML5 Development Environment Tutorial Test & Submit a Microsoft Windows Phone 8* App v1.00 : 04.09.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.

More information

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer. Installation Guide This guide explains how to install an (Intel SSD) in a SATA-based desktop or notebook computer. The instructions include migrating your data from your current storage device (such as

More information

System Image Recovery* Training Foils

System Image Recovery* Training Foils Intel-powered Classmate PC System Image Recovery* Training Foils Version 1.0 1 *Other names and brands may be claimed as the property of others. Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*

More information

Intel Desktop Board DQ35JO

Intel Desktop Board DQ35JO Intel Desktop Board DQ35JO Specification Update May 2008 Order Number E21492-002US The Intel Desktop Board DQ35JO may contain design defects or errors known as errata, which may cause the product to deviate

More information

Software Solutions for Multi-Display Setups

Software Solutions for Multi-Display Setups White Paper Bruce Bao Graphics Application Engineer Intel Corporation Software Solutions for Multi-Display Setups January 2013 328563-001 Executive Summary Multi-display systems are growing in popularity.

More information

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 李 國 輝 客 戶 方 案 事 業 群 亞 太 區 解 決 方 案 架 構 師 美 商 英 特 爾 亞 太 科 技 有 限 公 司 Email: kuo-hui.li@intel.com 1 Legal

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Ubuntu* Enterprise Cloud Executive Summary Intel Cloud Builder Guide Intel Xeon Processor Ubuntu* Enteprise Cloud Canonical*

More information

Intel Desktop Board D945GCL

Intel Desktop Board D945GCL Intel Desktop Board D945GCL Specification Update December 2007 Order Number D74277-004US The Intel Desktop Board D945GCL may contain design defects or errors known as errata, which may cause the product

More information

Security in the Cloud

Security in the Cloud solution brief Cloud Computing Security in the Cloud Intel Xeon Processor E5-4600/2600/2400/1600 Intel Technologies Enable More Secure Business Computing in the Cloud Would you like to begin transforming

More information

Intel Remote Configuration Certificate Utility Frequently Asked Questions

Intel Remote Configuration Certificate Utility Frequently Asked Questions Intel Remote Configuration Certificate Utility Frequently Asked Questions General Info 1. What operating system do I have to use to run the wizard? 2. What configurations are required prior to running

More information

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

Intel Data Direct I/O Technology (Intel DDIO): A Primer > Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery

Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery WHITE PAPER Cost-Efficient SSL Application Delivery Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery Always On SSL Since 1994, enterprises looking to protect the security

More information

Intel Solid-State Drive Data Center Tool User Guide Version 1.1

Intel Solid-State Drive Data Center Tool User Guide Version 1.1 Intel Solid-State Drive Data Center Tool User Guide Version 1.1 Order Number: 327191-002 October 2012 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

Displaying Stereoscopic 3D (S3D) with Intel HD Graphics Processors for Software Developers August 2011

Displaying Stereoscopic 3D (S3D) with Intel HD Graphics Processors for Software Developers August 2011 Displaying Stereoscopic 3D (S3D) with Intel HD Graphics Processors for Software Developers August 2011 Document Number: TBD Introduction INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Intel Media Server Studio - Metrics Monitor (v1.1.0) Reference Manual

Intel Media Server Studio - Metrics Monitor (v1.1.0) Reference Manual Intel Media Server Studio - Metrics Monitor (v1.1.0) Reference Manual Overview Metrics Monitor is part of Intel Media Server Studio 2015 for Linux Server. Metrics Monitor is a user space shared library

More information

Recovery BIOS Update Instructions for Intel Desktop Boards

Recovery BIOS Update Instructions for Intel Desktop Boards Recovery BIOS Update Instructions for Intel Desktop Boards All BIOS update files for Intel Desktop Boards are available on Intel's Download Center at http://downloadcenter.intel.com/. Important Notes:

More information

Intel Desktop Board D101GGC Specification Update

Intel Desktop Board D101GGC Specification Update Intel Desktop Board D101GGC Specification Update Release Date: November 2006 Order Number: D38925-003US The Intel Desktop Board D101GGC may contain design defects or errors known as errata, which may cause

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide

More information

RAPID EMBEDDED LINUX* DEVELOPMENT

RAPID EMBEDDED LINUX* DEVELOPMENT Open Source on Intel case study Digital signage solutions from QNAP Systems Inc. use embedded Linux* to support usage models for advertising, marketing, and other types of public multimedia displays in

More information

AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI -

AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI - AES Flow Interception : Key Snooping Method on Virtual Machine. - Exception Handling Attack for AES-NI - Tatsuya TAKEHISA, Hiroki NOGAWA, and Masakatu MORII Abstract. In this paper, we propose a method

More information