Strengthening Security Protection

Intel® hardware-enabled security boosts protection and enables the ecosystem to better defend against evolving and modern threats.1

Enabling Innovation with Security at the Core

Cyber-attacks are moving down the computing stack, traversing from software to hardware, threatening devices in homes, cars, businesses, networks, and cloud. The legacy model of software protecting software can’t keep up with advancing threats against digital security, safety, and privacy. Intel builds hardware-enabled security capabilities directly into our silicon to help protect every layer of the compute stack (hardware, firmware, operating systems, applications, networks, and the cloud).

Read the RSA blog for the latest silicon security innovations ›

Hardware-Enhanced Threat Detection

Intel® Threat Detection Technology (Intel® TDT) is a suite of hardware-enhanced technologies that can be incorporated into independent software vendors security solutions to augment existing capabilities and improve the detection of evolving cyber threats and exploits. Intel TDT is built into the underlying silicon and uses a combination of CPU data, machine-learning algorithms, and Intel integrated graphics for security workloads.
The following capabilities are now available:

  • Accelerated Memory Scanning (AMS) for security workloads
  • Exploit detection using advanced platform telemetry

Read the Intel® Threat Detection Technology (Intel® TDT) product brief ›

View the Intel® TDT demo video ›

Best Practice Security Designed-in from the Start

Intel® Security Essentials provides a built-in foundation of core security capabilities that accelerate the ecosystem’s adoption of high assurance hardware-enabled security for trusted computing. These capabilities are available across Intel® processors, and they enable security professionals to protect platforms and data, while building trusted applications in a consistent way.

Read the solution brief ›

Read the blog ›

The Power of Hardware-Enabled Security Technologies

Intel offers several ground breaking technology solutions that automate, accelerate, and scale security beyond software or human based approaches. Intel® Threat Detection Technology (Intel® TDT) is a suite of hardware assisted technologies that can be incorporated into ISV security solutions to augment their existing capabilities to improve the detection of advanced cyber threats and exploits. Intel® Software Guard Extensions (Intel® SGX) provides unique capabilities that help improve the privacy, scalability, and trust in blockchain solutions.

Learn more about Intel® SGX Solutions for blockchain ›

Protecting the Connected World

Enterprise

You’ve read the headlines. It’s time to modernize your endpoint security strategy and software alone is not enough. Strengthen identity and access management with security built into 7th Gen Intel® Core™ vPro™ processor-based devices.

Learn more about hardware-enhanced endpoint security

Learn more about Intel® Authenticate Technology

Consumer

Taking the hassle out of securing your digital life. For your identity, data, passwords, and financial transactions, get protection beyond software, rooted in silicon.

Learn more about Intel® Online Connect

Learn more about securing your digital life

Data Center

Trusted infrastructure is the foundation of data center security solutions, protecting data and users from the silicon root, up the entire stack, into the cloud.

Learn more about Trusted Infrastructure

Learn more about securing data centers that power the cloud

Internet of Things (IoT)

Providing a portfolio of hardware assisted security solutions that harden edge devices, enable communications, and deliver command and control from security management platforms.

Learn more about Intel® Secure Device Onboard (Intel® SDO)

Learn more about Intel® Enhanced Privacy ID (Intel® EPID)

Información sobre productos y rendimiento

1

Las características y ventajas de las tecnologías Intel® dependen de la configuración del sistema y puede que requieran la activación de hardware, software o servicios. El rendimiento variará en función de la configuración del sistema. Ningún sistema es absolutamente seguro. Consulte con el vendedor o fabricante de su sistema o visite www.intel.es para obtener más información.