Trusted compute pools with Intel® Trusted Execution Technology (Intel® TXT)1 support IT compliance by protecting virtualized data centers’ private, public, and hybrid clouds against attacks toward hypervisor and BIOS, firmware, and other pre-launch software components.
A feature of the Intel® Xeon® processor, Intel TXT establishes a root of trust through measurements when the hardware and pre-launch software components are in a known good state. Utilizing the result, administrators can set policies for sensitive data and workload placement onto groups of servers known as trusted compute pools.
With Intel TXT, you can:
Imagine a piece of manufacturing or retail equipment becoming compromised—possibly manipulated via network, USB flash drive, or an illegal peripheral at boot time. Intel TXT measures and detects these and other manipulations. Using such measurements, systems can be kept from booting.
Have questions? Contact us >
1. 電腦系統不可能在任何情況下都絕對安全。若要使用 Intel® 可信賴執行技術 (Intel® TXT)，電腦系統必須具備 Intel® 虛擬化技術、啟用 Intel TXT 的處理器、晶片組、BIOS、通過驗證的程式碼模組 (Authenticated Code Module)，以及 Intel TXT 相容的量測標準啟動環境 (MLE)。Intel TXT 也需要系統包含 TPM 1.2 版。如需詳細資訊，請參閱 www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html。