Intel Trusted Execution Technology for Server Platforms

A Guide to More Secure Data Centers
Book Type: Related Books

Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / data center manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the data center’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the data center can create and use trusted pools.

“This book is an excellent read for Data Center Managers, IT Personnel, and Executives who need to understand enhanced server security, and the need for greater abstraction at all layers of technology, not just compute, network and storage hardware. Intel® TXT provides an invaluable anchor to build a chain of trust in the software stacks that may be deployed anywhere and managed by anyone. HyTrust relies on Intel TXT to provide visibility and policy-based controls of the emerging software defined data centers.”  

Hemma Prafullchandra, Chief Technology Officer and SVP, Products, HyTrust, Inc.

“Intel’s TXT technology provides the nucleus for defining and building trusted server/systems. Without this foundational component, deeply rooted in the processor, IT professionals must continue to rely on software based methods that have consistently been exploited. Using Intel’s TXT as a known starting point of trusted and secure computing, we can lay the bedrock of a solid “Defense in force” strategy to secure our vital systems. With this enhanced security posture, the goal of using lower cost, yet highly secure, could based computing services is one step closer to reality.” 

Merritte Stidston, Director, DCT Strategy and Technology Innovation, Distinguished Technologist, McKesson IT

“As a CSP (Cloud Service Provider) our clients depend on us to ensure the highest levels of trust and integrity for their critical hosted workload environments. Intel’s TXT based technologies and the ecosystem that we have created to enhance it with Geolocation and Geofencing has been thoroughly contemplated and described by this book.  This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk.” 

Pete Nicoletti, CISO, Virtustream Inc.

About the Author(s)

James Greene

James Greene is currently in a product marketing role for Security Technologies at Intel.  In this role, he is responsible for the definition of products and usage models for datacenter and cloud security solutions such as Intel Trusted Execution Technology.

He came to Intel when that company purchased Conformative Systems in 2005.  At Conformative, James led all product marketing activities for the XML processing appliance portfolio.  Prior to that, James held several leadership roles in marketing, strategy, market development and business and technology planning for Compaq and Hewlett Packard enterprise server, workstation and storage business units.James is a graduate of Bridgewater State College in Massachusetts.

William T. Futral

William T. Futral is an I/O architect on Intel's Advanced Components Division Architecture Team. As a veteran of standards activities, he was the author of various specifications, in particular the IEEE 802.5 Token Ring and Intelligent IO Architecture. Bill was a major contributor to InfiniBand architecture from its inception. Currently, he serves as Co-Chair of the InfiniBand Trade Association's Application Working Group.