Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel® Tiber™ Transparent Supply Chain

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel® Tiber™ Transparent Supply Chain

Providing provenance data and traceability of hardware components, firmware, and systems.

  • Benefits
  • Use Cases
  • FAQs

U.S. Customers

U.S. Partners

Your registration cannot proceed. The materials on this site are subject to U.S. and other applicable export control laws and are not accessible from all locations.

End-to-End Visibility and Transparency for Your Technology Supply Chain

Cybersecurity threats are ever-increasing in today’s rapidly evolving technological landscape. Intel Tiber Transparent Supply Chain provides businesses with powerful tools to verify the authenticity and integrity of their hardware, ensuring system security from production through lifecycle. Learn how Intel Tiber Transparent Supply Chain helps safeguard system components by detecting changes and preventing potential breaches, enabling companies to conduct business confidently.

Product specifications icon

Provenance

Digitally signed statement of conformance for every platform attests to authenticity of platform as-built during manufacturing.

Security and trust policy icon

Traceability

Platform certificates linked to the discrete Trusted Platform Module (TPM) provide system-level traceability.

Unnati industry icon 04

Assurance

The Auto Verify utility compares the “snapshot” of the direct platform data taken during manufacturing with a “snapshot” of the platform components taken at first boot to help detect tampering.

Logged in icon

Accountability

Component-level traceability via Direct Platform Data File contains all L9 integrated components including processor, storage, memory, and add-in cards.

Show more Show less

Ensuring Device Security from the Factory Floor Through End of Life

With the expansion of data centers, cloud computing, and the Internet of Things, ensuring trust in the supply chain has become more important than ever. Intel Tiber Transparent Supply Chain helps enhance security for everything from sourcing components to distribution of the final product.

 

Read the product brief

Individual looking outwards to a city with data points
Lenovo Logo

LenovoThinkShield Build Assure is built on Intel® Tiber™ Transparent Supply Chain. Lenovo’s collaboration with Intel extends from motherboard production through the factory floor to customer platforms, enabling customers to verify the authenticity of components, installed firmware, and system configuration.
 
“Lenovo ThinkShield Supply Chain Assurance powered by Intel® Tiber™ Transparent Supply Chain brings us to a very advanced level of security. It allays our concerns around data exfiltration and negates a wide range of attacks that our security teams are typically worried about. The transparent supply chain significantly boosts our trust in the authenticity and integrity of our hardware.”

 

Venkatesh Gopal

Security Engineer, Meta

 

Learn how Meta is working with Lenovo and Intel to validate the provenance, security, and authenticity of employee devices while reducing the provisioning burden for Meta’s IT teams.

Read the case study

Intel Tiber Transparent Supply Chain Use Cases

  • Detect Changes and Verify System Configuration
  • Private Data Center
Individual using a laptop with an overlay that shows a screen updating

Detect Potential Threats Before They Affect Your Network

Detecting changes and verifying system configuration helps mitigate the risk of counterfeit components and malicious hardware, tampering during transit, and even espionage or sabotage, adding a layer of protection to both the device and the company’s network.

Intel Tiber Transparent Supply Chain allows you to verify platform certificate validity. This helps mitigate risks related to counterfeit components, tampering, supply chain transparency, and insider threats, while helping ensure regulatory compliance.

An image of a city with multiple points connecting

Proving the Integrity and Security of Your Infrastructure

Owning the entire stack—including the network and infrastructure used to deliver services—offers the opportunity to provide unique solutions and gives control over the end-to-end experience and functionality. It also means you must demonstrate the integrity and security of your infrastructure to potential customers.

That’s where Intel Tiber Transparent Supply Chain comes in. It is designed to provide evidence of hardware integrity to relying parties, verify the authenticity of infrastructure components, and strengthen compliance with security controls.

Additional Resources

Lenovo and Intel's Innovative Approach to Supply Chain Integrity (blog)

Increasing Visibility of the Device Supply Chain to Improve Cybersecurity (InTechnology Podcast)

Lenovo and Intel Collaborate on ThinkShield Build Assure

From Smart Devices to Supply Chain: Lenovo's Blueprint for Trust in Tech (InTechnology Podcast)

Ensuring Device Security from the Factory Floor Through End of Life

FAQs

Frequently Asked Questions

Intel Tiber Transparent Supply Chain provides utilities that can be used to compare the system configuration with the original as-built configuration during manufacturing.

Yes. You can download your device's data from the Intel Tiber Transparent Supply Chain portal and use it within your enterprise as needed.

Yes. You can access your device data using APIs for integration with your enterprise applications.

Intel Tiber Transparent Supply Chain supports Single Sign-on (SSO) and offers role-based access for users.

Yes. Intel Tiber Transparent Supply Chain provides utilities for OEMs to capture device information during manufacturing and offers support for deployment, training, and supply chain utilities. Contact us for more information.

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo