Create a Silicon-Based Trusted Infrastructure

The Intel® Xeon® Scalable platform delivers an essential, hardware-based root-of-trust environment. Protection extends up from the silicon, through the platform hardware and firmware, ensuring an effective IT security platform.

Ensure Trust, Resilience, and Control

Intel® technology enables Trusted Infrastructure through a suite of platform security technologies built into Intel® silicon. Hardware-based security technologies provide a critical foundation for secure IT. They address the numerous, increasing, and evolving security threats across physical and virtual infrastructures.

The Attack Surface Is Expanding

As more devices connect to the Internet and workloads move to the cloud, hacking is a greater threat than ever. Traditional schemes against known-bad elements are not enough to keep the enterprise secured. Instead, the entire IT infrastructure must be secure, starting from the root with platform silicon.

Deploy a Comprehensive Solution

Trusted Infrastructure relies on hardware-based security built directly into the foundation of the platform, Intel® Xeon® Scalable processors. It is part of a suite of solutions that includes: Intel® Cloud Integrity Technology (Intel® CIT), Intel® Trusted Execution Technology (Intel® TXT) with One-Touch Activation, and Intel® Platform Trust Technology (Intel® PTT).1

Intel® PFR—Protect Platform Firmware

Intel® Platform Firmware Resilience (Intel® PFR)

Protect, Detect and Recover server platform firmware, using an Intel® FPGA based root of trust solution.

Intel® TXT—Secure the Platform

Intel® Trusted Execution Technology (Intel® TXT)

Provide the necessary underpinnings to evaluate the computing platform and its security. Now with One-Touch Activation, it’s easier than ever to deploy.

Intel® SecL- DC—Security Technologies at Cloud Scale

Intel® Security Libraries for Data Center (Intel® SecL - DC)

Software libraries and services that simplify deployment of hardware-rooted Intel security technologies at cloud scale.

Get Started with Intel® TXT

Intel® Cloud Builders Creates Industry Collaboration

Leading industry solutions providers share access to publications, reference architectures, white papers, solutions briefs, and more.

Join now

Implement Intel® CIT

Use Intel® CIT to manage the integrity of virtualized and non-virtualized Intel-IA based platforms.

Learn how

Procure Intel® TXT Products and Solutions

Purchase a server from the OEM/ODM with a discrete Trusted Platform Module (TPM) chip or integrated Intel® PTT, enabled directly on their platform.

Start here

Activate Intel® TXT

Solutions and products for Intel® TXT are available from leading server systems providers as well as software and services providers.

Find out more

Take Advantage of These Helpful Resources

Enhance Server Platform Security with Intel® TXT

Learn how hardware-based security technologies help address increasing and evolving security threats.

Read the white paper

The Road to a Secure, Compliant Cloud

Learn how to build a trusted cloud infrastructure.

Read the white paper

Install and Configure Intel® TXT

Get complete background and step-by-step procedures with the Intel® TXT configuration guide.

Read the white paper

See How SoftLayer Uses Intel® TXT

SoftLayer simplifies a cloud environment that measures, monitors, and verifies the security and integrity of the entire system.

Read the white paper

Product and Performance Information


Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at