Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.
A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models: cryptography for data protection, identity and access management, service gateways, and trusted compute pools.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Using Intel® AES-NI in cloud reduces code size, execution cycles, vulnerability to attack while boosting performance.
Enhancing server and cloud security with Intel® Trusted Execution Technology
Research video about networking and storage.
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data Center Alliance.