The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
Cloud security cannot be ignored. Learn to manage the most critical security challenges - with technologies that promote pervasive data encryption, protect infrastructure, and build higher security assurance that can be leveraged for compliance.
Learn effective cloud security management
Organizations can no longer rely on firewalls as a single point of control for the cloud, and security practices must expand beyond the data center to include edge systems and endpoint devices.
Learn the basics
With a solid understanding of security, you can start planning how to protect your assets at every service layer. Streamline the process by using our practical tools, resources, and planning guides.
Plan your strategy
Intel® technologies, in combination with products from our strategic partner, McAfee, extend security stack protection—from silicon to software to network administration.
Decide on technology
Designed to help power and protect the infrastructure stack from the ground up, with capabilities that make a difference in how well your cloud moves, processes, and safeguards data.
Learn about Intel® Cloud Technology
Use this tool to identify cloud service providers that offer the infrastructure-as-a-service features and capabilities that matter most to you.
Use Intel® Cloud Finder
Dive into our resources for cloud computing solutions podcasts and webcasts, or search our library for reference architectures of successful real-world private cloud implementations.
Visit our resource page
Search the reference architecture library
Intel is accelerating the development of open, interoperable cloud solutions through partnerships with key industry groups such as the Open Data Center Alliance (ODCA).
Open Data Center Alliance
Enlightening key findings from 800 IT managers surveyed that provide insight into cloud computing security concerns and how those concerns might be alleviated.
Read peer research report
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better manage data security.
Watch the Intel® data protection technologies video
Practical steps to help IT managers plan cloud computing security, with recommendations for strengthening endpoint, platform, and data center infrastructure protections in cloud implementations.
Read the cloud security checklist
Explore how Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers that mitigates the risks of moving sensitive information and applications to our private cloud.
Read the private cloud paper
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.
Watch the Intel® Trusted Execution Technology video
A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models: cryptography for data protection, identity and access management, service gateways, and trusted compute pools.
Read the Intel Security Technology for the Cloud guide
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Cloud security issues research video.
Enhancing server and cloud security with Intel® Trusted Execution Technology
Using Intel® AES-NI in cloud reduces code size, execution cycles, vulnerability to attack while boosting performance.
Parallels discusses building a cloud with Trusted Compute Pools