ASBIS near you

Our network of 27 subsidiaries located all over the EMEA region supplies Information and Communications Technology products and solutions across the globe. Find ASBIS office in your country.

Other headlines

November 24, 2020
The partnership is tailored to meet the security orchestration, automation, and ...
November 09, 2020
One of the largest IT distributors in the EMEA region celebrates 30 years on ...
October 15, 2020
Value-Added distributor ASBIS announces its distribution agreement with Kemp, ...
October 14, 2020
ASBIS is now an official global partner of MacPaw, an independent software ...
October 07, 2020
ASBIS Slovakia, a subsidiary of ASBISC Enterprises PLC (WSE: ASB), participated ...
October 06, 2020
Value Added distributor ASBIS begins to supply A10, a leading provider of ...
October 01, 2020
ASBISc Enterprises Plc, a leading distributor of IT products in the growing ...
September 08, 2020
ASBIS extends its cooperation with DELL Technologies in CEE region
August 07, 2020
Prestigio, a brand owned by the international ASBISc Enterprises Plc Group, ...
August 04, 2020
ASBISc Enterprises Plc, a leading distributor of IT products on emerging ...
Intel Xeon Scalable Platform Built for Most Sensitive Workloads

November 04, 2020

Intel, Server, XEON

Intel Xeon Scalable Platform Built for Most Sensitive Workloads

Intel introduces new security technologies to help secure sensitive workloads and enable new opportunities to unleash the power of data in its upcoming 3rd Generation Intel® Xeon® Scalable Platform, code-named “Ice Lake.”

Intel unveiled the suite of new security features for the upcoming 3rd generation Intel® Xeon® Scalable platform, code-named “Ice Lake.” Intel is doubling down on its Security First Pledge, bringing its pioneering and proven Intel® Software Guard Extension (Intel® SGX) to the full spectrum of Ice Lake platforms, along with new features that include Intel® Total Memory Encryption (Intel® TME), Intel® Platform Firmware Resilience (Intel® PFR) and new cryptographic accelerators to strengthen the platform and improve the overall confidentiality and integrity of data.

Data is a critical asset both in terms of the business value it may yield and the personal information that must be protected, so cybersecurity is a top concern. The security features in Ice Lake enable Intel’s customers to develop solutions that help improve their security posture and reduce risks related to privacy and compliance, such as regulated data in financial services and healthcare.

“Protecting data is essential to extracting value from it, and with the capabilities in the upcoming 3rd Gen Xeon Scalable platform, we will help our customers solve their toughest data challenges while improving data confidentiality and integrity. This extends our long history of partnering across the ecosystem to drive security innovations,” said Lisa Spelman, Intel corporate vice president in the Data Platform Group and general manager of the Xeon and Memory Group.

Data Protection across the Compute Stack

Technologies such as disk- and network-traffic encryption protect data in storage and during transmission, but data can be vulnerable to interception and tampering while in use in memory. “Confidential computing” is a rapidly emerging usage category that protects data while it is in use in a Trusted Execution Environment (TEE). Intel SGX is the most researched, updated and battle-tested TEE for data center confidential computing, with the smallest attack surface within the system. It enables application isolation in private memory regions, called enclaves, to help protect up to 1 terabyte of code and data while in use.

“Microsoft Azure was the first major public cloud to offer confidential computing, and customers from industries including finance, healthcare, government are using confidential computing on Azure today,” said Mark Russinovich, chief technology officer, Microsoft Azure. “Azure has confidential computing options for virtual machines, containers, machine learning, and more. We believe the next-generation Intel Xeon processors with Intel SGX featuring full memory encryption and cryptographic acceleration will help our customers unlock even more confidential computing scenarios.”

Intel is also introducing new security capabilities to improve data protection and strengthen the platform, including:

  • Full memory encryption: To better protect the entire memory of a platform, Ice Lake introduces a new feature called Intel Total Memory Encryption (Intel TME). Intel TME helps ensure that all memory accessed from the Intel® CPU is encrypted, including customer credentials, encryption keys and other IP or personal information on the external memory bus. Intel developed this feature to provide greater protection for system memory against hardware attacks, such as removing and reading the dual in-line memory module (DIMM) after spraying it with liquid nitrogen or installing purpose-built attack hardware. Using the National Institute of Standards and Technology (NIST) storage encryption standard AES XTS, an encryption key is generated using a hardened random number generator in the processor without exposure to software. This allows existing software to run unmodified while better protecting memory.
  • Cryptographic acceleration: One of Intel’s design goals is to remove or reduce the performance impact of increased security so customers don’t have to choose between better protection and acceptable performance. Ice Lake introduces several new instructions used throughout the industry, coupled with algorithmic and software innovations, to deliver breakthrough cryptographic performance. There are two fundamental innovations. The first is a technique to stitch together the operations of two algorithms that typically run in combination yet sequentially, allowing them to execute simultaneously. The second is a method to process multiple independent data buffers in parallel.
  • Growing resilience: Sophisticated adversaries may attempt to compromise or disable the platform’s firmware to intercept data or take down the server. Ice Lake introduces Intel® Platform Firmware Resilience (Intel PFR) to the Intel Xeon Scalable platform to help protect against platform firmware attacks, designed to detect and correct them before they can compromise or disable the machine. Intel PFR uses an Intel FPGA as a platform root of trust to validate critical-to-boot platform firmware components before any firmware code is executed. The firmware components protected can include BIOS Flash, BMC Flash, SPI Descriptor, Intel® Management Engine and power supply firmware.

Privacy-preserving, trusted platforms in the upcoming 3rd generation Xeon Scalable processors will help drive even greater innovative services, usage models and solutions for organizations looking to activate the full value of their data.

To learn more about how Intel SGX can help protect sensitive workloads and data, visit www.intel.com/sgx and www.confidentialcomputing.io.

Contact ASBIS managers in your country or vad@asbis.com to get more information about new Intel Xeon Scalable Platform.

About Intel

Intel (Nasdaq: INTC) is an industry leader, creating world-changing technology that enables global progress and enriches lives. Inspired by Moore’s Law, we continuously work to advance the design and manufacturing of semiconductors to help address our customers’ greatest challenges. By embedding intelligence in the cloud, network, edge and every kind of computing device, we unleash the potential of data to transform business and society for the better. To learn more about Intel’s innovations, go to newsroom.intel.com and intel.com.

© Intel Corporation. Intel, the Intel logo and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

Disclaimer: The information contained in each press release posted on this site was factually accurate on the date it was issued. While these press releases and other materials remain on the Company's website, the Company assumes no duty to update the information to reflect subsequent developments. Consequently, readers of the press releases and other materials should not rely upon the information as current or accurate after their issuance dates.