Intel® Trust Domain Extensions (Intel® TDX)
Control access to data in use—whether in the cloud or in the data center—by isolating data and applications in a virtual machine (VM) protected by Intel TDX®.
Confidential VMs for the Masses
Google Cloud’s new C3 instances offer hardware-based privacy and confidentiality for your sensitive workloads or regulated data, enabled by Intel TDX.
Support Business Growth While Managing Risk
Businesses and their operations teams face the monumental task of enabling continuous innovation while combatting cyberattacks and data breaches that can result in losses of valuable data or intellectual property, compliance issues, and reputational damage.
Intel® TDX is Intel’s newest confidential computing technology that helps to strategically narrow the attack surface and increase data and application protection and confidentiality in the data center or in the cloud through hardware-level isolation within a virtual machine (VM).
VM isolation with Intel® TDX simplifies the porting and migration of existing applications to a confidential computing environment. In most cases, no application code changes are required to activate a trusted domain enabled by Intel® TDX inside a VM.
Establish Data Sovereignty and Control
Intel® TDX enables organizations to control the use of valuable data and intellectual property by isolating it within confidential VMs that minimize security risks and by limiting protected data access to only software or administrators with explicit permission. Within the VM, Intel® TDX isolates the guest OS and applications from the cloud host, underlying hypervisor, cloud management stack, and other VMs.
Protect Data and Intellectual Property
Intel® TDX helps to reduce attack surfaces and mitigate the risk of data breaches, tampering, or theft by outside entities—either malicious attackers, rogue cloud admins, or other cloud tenants—through hardware-enhanced isolation of confidential data in a trusted execution environment (TEE) within a VM. It accommodates a wide range of deployments, including large application suites with a full-featured OS, multiple containers, or small, highly specialized VMs with a lightweight OS and purpose-built, privacy-preserving applications.
Simplify Regulatory Compliance
Intel® TDX, Intel® SGX, and other Intel® Security Engines can help organizations governed by stringent data privacy regulations—such as those in healthcare, finance, and the public sector—meet compliance standards with encryption and secure enclaves that protect sensitive data in use while maintaining full data availability for authorized uses and users.
Deploy AI in a Trusted Environment
Intel® TDX helps protect apps, data, and AI models from unauthorized access with robust isolation, integrity, and confidentiality capabilities. Its security capabilities support the use of sensitive data for training and analysis of AI models without exposing that data to other software, collaborators, or cloud providers.
Looking for Information on Application Isolation?
Intel® Software Guard Extensions (Intel® SGX) enables users to restrict access to their most sensitive applications and data in a protected enclave with the smallest trust boundary available, compared to other confidential computing technologies.
Our confidential computing portfolio offers three security technologies to meet the unique needs and regulatory requirements of businesses of all sizes across industries. With application isolation, VM isolation, and operator-independent, multicloud attestation capabilities, you can choose the level of security you need to realize more value from your data while remaining protected and compliant.
Intel® SGX
Protect data confidentiality and integrity within the smallest available trust boundary.
Intel® Trust Authority
Enable zero trust attestation that verifies the trustworthiness of compute assets at the network and edge and in the cloud.
Get Started with Intel® TDX
Intel® TDX technology is currently available through these cloud service providers:
Alibaba
Learn how to build and verify a confidential computing environment on an Intel® TDX-protected Elastic Compute Service (ECS) instance.
Google Cloud
Leverage Intel® TDX on this robust cloud infrastructure for advanced data protection and seamless integration with your existing systems.
Microsoft Azure
Harness the power of Intel® TDX on Microsoft Azure, a flexible and scalable cloud computing platform designed for secure and efficient operations.
See How Security-Sensitive Organizations Are Succeeding with Intel® TDX
Learn More about Intel® Security Solutions
Frequently Asked Questions
Intel® TDX is available through select cloud service providers using 4th Gen Intel® Xeon® Scalable processors and is widely available with the release of 5th Gen Intel® Xeon® Scalable processors.
Intel® TDX relies on VM isolation, which simplifies porting of existing applications to a confidential computing environment. In most cases, no application code changes are required. Application-based isolation with Intel® SGX can help shrink the attack surface further, but more development effort may be needed to design code for the Intel® SGX environment.