Transparent Supply Chain
Providing provenance data and traceability of hardware components, firmware, and systems.
Your registration cannot proceed. The materials on this site are subject to U.S. and other applicable export control laws and are not accessible from all locations.
End-to-End Visibility and Transparency for Your Technology Supply Chain
Cybersecurity threats are ever-increasing in today’s rapidly evolving technological landscape. Intel Transparent Supply Chain provides businesses with powerful tools to verify the authenticity and integrity of their hardware, ensuring system security from production through lifecycle. Watch how Intel Transparent Supply Chain helps safeguard system components by detecting changes and preventing potential breaches, enabling companies to conduct business confidently.
Provenance
Digitally signed statement of conformance for every platform attests to authenticity of platform as-built during manufacturing.
Traceability
Platform certificates linked to the discrete Trusted Platform Module (TPM) provide system-level traceability.
Assurance
TSC utility compares the “snapshot” of the direct platform data taken during manufacturing with a “snapshot” of the platform components taken at first boot to help detect tampering.
Accountability
Component-level traceability via Direct Platform Data File contains all L9 integrated components including processor, storage, memory, and add-in cards.
Intel Transparent Supply Chain Use Cases
Detect Potential Threats Before They Affect Your Network
Detecting changes and verifying system configuration helps mitigate the risk of counterfeit components and malicious hardware, tampering during transit, and even espionage or sabotage, adding a layer of protection to both the device and the company’s network.
Intel® Transparent Supply Chain allows you to detect and prevent unwanted system changes, verify platform certificate validity, and monitor firmware versions below the OS. This helps mitigate risks related to counterfeit components, tampering, supply chain transparency, and insider threats, while helping ensure regulatory compliance.
Ensuring Device Security From the Factory Floor Through End of Life
With the expansion of data centers, cloud computing, and the Internet of Things, ensuring trust in the supply chain has become more important than ever. A supply chain based on the Intel® Transparent Supply Chan Service can enhance security for everything from sourcing components to distribution of the final product.
Lenovo Offers Unparalleled Level of Supply Chain Transparency and Security with Intel Transparent Supply Chain
Lenovo ISG has paired its industry leading supply chain with Intel’s innovative Transparent Supply Chain program to add a layer of protection to your data center and bring peace of mind that the server hardware you bring into it is safe authentic and with documented, testable, and provable origin.
FAQs
Frequently Asked Questions
Intel TSC provides utilities that can be used to compare the system configuration with the original as-built configuration during manufacturing.
Yes. You can download TSC data of your device from TSC portal and use it within your Enterprise as needed.
Yes. You can access TSC data of your device by using APIs or use it for integration with your Enterprise applications.
Intel TSC supports Single Sign-on (SSO) and offers role-based access for users.
Intel TSC provides utilities for OEMs to capture device information during manufacturing and also, offers support for deployment, training, and TSC utilities.
Manage Employee Devices and Reduce the Risk of Tampering
Administer and secure your employees’ devices with Intel® Transparent Supply Chain tools. Improve device management by verifying and updating the current machine state and storing new system images signed by Intel. Strengthen device tamper resistance and verify machine state integrity through attestation to help reduce risk exposure to vulnerabilities below the OS and prevent non-compliant systems from accessing your network.
The end result is reduced IT help desk calls and reduced risk exposure while helping to ensure IT compliance across the company.
Strengthen PCI Compliance and Help Protect Critical Payment Hardware
Payment terminals often provide a convenient access point for criminals looking to steal credit card data. Intel® Transparent Supply Chain can help identify any changed machine variables on the payment terminal, allowing you to detect unwanted or unsupported changes, trigger an alert that the device needs to be investigated, and either allow or deny network access for payment processing to reduce the chance of fraudulent charges.
Ensure Regulatory Compliance and Gain a Competitive Edge
Securing the supply chain, ensuring firmware security, and maintaining device integrity are critical for all businesses, but they are especially important for systems integrators looking to secure heavily regulated public sector contracts.
Implementing Intel® Transparent Supply Chain technology provides a straight-forward, automated platform that helps address compliance mandates, ensures hardware and firmware security, mitigates risks of data leaks and insider attacks, and provides a competitive edge through Know Your Hardware technology.
Proving the Integrity and Security of Your Infrastructure
Owning the entire stack—including the network and infrastructure used to deliver services—offers the opportunity to provide unique solutions and gives control over the end-to-end experience and functionality. It also means you must demonstrate the integrity and security of your infrastructure to potential customers.
That’s where Intel® Transparent Supply Chain comes in. It provides verified evidence of compute hardware integrity to relying parties. It also verifies the authenticity of infrastructure components, offers visibility into firmware updates and vulnerability patches below the OS, and strengthens compliance with security controls.