Intel® Security Engines Enhance Data Security to Drive Innovation
Put sensitive data to work while preserving confidentiality and integrity with the integrated security features in Intel® Xeon® Scalable processors.1
Get More Value from Your Data Without Compromising Security
Intel® Security Engines, built into Intel® Xeon® Scalable processors, deliver enhanced security capabilities that allow for even the most sensitive data to be available for AI analysis, training, or processing—all while remaining private and confidential.
Whether you’re working in the cloud, at the edge, or on-premises, Intel® Security Engines help you extract the most value from sensitive or regulated data.
Achieve Rigorous Security for Your Artificial Intelligence Initiatives
Our integrated security features help you overcome evolving security challenges so you can put more of your data into action with confidence.
Reduce Attack Risks and Strengthen Your Threat Response
Achieve robust threat prevention and improve your ability to respond to threats if they occur, with the advanced capabilities of Intel® Security Engines.
Control Who Accesses and Sees Sensitive Data
Strengthen compliance and keep your important data protected. Intel® Security Engines enable high levels of cryptographic security with enhanced access control—so only those who are authorized can see and work with your data.
Add Layers of Protection between Your Data and Threats
Make it as difficult as possible for adversaries to access, steal, or corrupt your data. With Intel® Security Engines, you can isolate your data into secure enclaves to help protect it from threats, attacks, and harm.
Protect Your Platform from the Ground Up
Enhance your security measures to mitigate specialized attacks at the firmware level that enable hijackers to gain control over your system. Intel® Security Engines feature security built in at the silicon level to protect all layers of systems.
Explore Integrated Intel® Security Engines
Intel® Security Engines include several integrated security features working in concert to help you boost the protection of confidential data, preserve code integrity, and maintain the high level of performance needed for your demanding workloads.
Workload Acceleration: Data-Handling Efficiency
Cryptographic Security
Enable high levels of cryptographic security, enhanced performance, and a more seamless user experience.
Data Encryption and Compression
Expedite the encryption and decryption of data to help reduce system resource consumption for your AI workloads.
Confidential Computing: Enhanced Protection and Privacy for Data in Use
Application Isolation
Protect and isolate your confidential data while it is actively in use. Intel® SGX, our unique application isolation technology, is one of two solutions that enable confidential computing.
VM Isolation and Protection
Increase confidentiality, enhance privacy, and gain control over your data at the VM level. Intel® TDX, our unique VM isolation technology, is one of two solutions that enable confidential computing.
Advanced Protection: Defenses Positioned throughout the Stack
Safe Software Behavior
Improve protection against control-flow hijacking—a class of malware that is difficult to defend.
Platform Integrity
Increase the protection of various platform firmware components from Permanent Denial of Service attacks.
See How Others Drive Innovation with Intel® Security Engines
Get Started with Intel® Security Engines
Browse Intel® Xeon® Scalable Processors
Find the processor that meets your needs—Intel® Security Engines integrated on all.
Experiment on the Intel® Developer Cloud
Prototype, test, and measure your security workloads across Intel® hardware solutions in our online sandbox.
Support Today’s Most Critical Workloads with Intel® Accelerator Engines
Intel® Xeon® Scalable processors provide six integrated accelerator engines,1 purpose-built to support today’s most challenging workloads, including AI, HPC, security, networking, analytics, and storage. Learn how you can maximize efficiency and performance while reducing costs and energy consumption, using these integrated features.
Product and Performance Information
Availability of accelerators varies depending on SKU. Visit the Intel Product Specifications page for additional product details.
Sarthak Pati, et al., “Federated Learning Enables Big Data for Rare Cancer Boundary Detection,” arXiv, https://arxiv.org/abs/2204.10836.