GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

Why Google Trusts Intel’s Security Strategy

globalresearchsyndicate by globalresearchsyndicate
February 25, 2020
in Data Collection
0
Why Google Trusts Intel’s Security Strategy
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter

Why Google Trusts Intel’s Security Strategy Placeholder Image

SAN FRANCISCO — Intel provided new details about its security stack at an event on the outskirts of this week’s RSA Conference. And, not surprisingly, the chipmaker’s security strategy is rooted in its silicon.

“When it comes to building an overall security stack, hardware and the firmware that runs on that hardware is bedrock,” said Tom Garrison, VP and GM of client security strategy and initiatives at Intel. “There’s nothing below hardware, and hardware is key. If you have trusted hardware below you, you can then build a trusted security stack.”

One of the ways Intel is working to build this trust in its hardware is through its Compute Lifecycle Assurance Initiative. The company first launched this initiative in December, and it aims to improve transparency and provide higher levels of security assurance across all Intel platforms and during the entire platform lifecycle.

Transparent Supply Chain

“Within Compute Lifecycle Assurance we have a set of tools we call Intel Transparent Supply Chain (TSC) tools,” Garrison said. These policies and procedures provide better visibility and traceability across Intel hardware and firmware components in PCs and data center servers including Intel Xeon platforms. They use the Trusted Computing Group’s (TCG) Trusted Platform Module 2.0 (TPM) standard to validate where and when these components were manufactured.

This process also helps manufacturers and customers detect tampering because they can review the platform’s inventory for suspect parts and attest to the platform’s authenticity, Garrison added. “You’ve got to start with trusted hardware and making sure you know if the hardware has been altered in any way,” he explained. “If it hasn’t, then you can trust it and start building your security stack.”

Today, Intel announced several ecosystem partners that are manufacturing Intel-based servers using Transparent Supply Chain tools. These include Hyve Solutions, Inspur, Lenovo, Mitac, Quanta, Supermicro, and ZT Systems. Intel is also working with enterprise IT and cloud services providers including Google Cloud to deploy Intel TSC.

In fact, Google VP of Security Engineering Vitaly Gudanets was supposed to join Garrison on stage to talk about Google’s experience with transparent supply chain. But he fell ill with a fever, and “given the environment and abundance of caution,” ahem, coronavirus, Gudanets stayed home.

“Google appreciates Intel’s leadership in establishing increased platform trust across the entire lifecycle of the device,” he said in a prepared quote on a screen. “Google has been collaborating with Intel to improve traceability and transparency solutions for Intel commercial notebook and desktop PCs. We appreciate the innovation of Transparent Supply Chain, and we want to guide future innovation to provide even greater levels of assurance.”

More TSC partners are in the works, Garrison said. “Our vision is much grander. Our vision is really across all phases of the compute lifecycle.”

Moving Up the Intel Security Stack

Moving up the stack, Intel is also developing new security capabilities for future data center platforms, said John Sell, Intel fellow and director of Intel security architecture and technology. These capabilities stretch from the field-programmable gate array (FPGA) layer all the way up to the application layer.

Starting at the top, Intel is going to expand its Software Guard Extensions to a broader range of mainstream data-centric platforms and provide larger protected enclaves to better isolate applications.

The company is also developing similar protections for containers and virtual machines (VMs), which will isolate them from each other, from the hypervisors, and from cloud providers without requiring application code modifications.

Full memory encryption is another soon-to-come capability that will help to better protect against physical memory attacks by providing hardware-based encryption transparent to the operating system and software layers.

And finally, Intel is developing an FPGA-based technology that helps protect the various platform firmware components by monitoring and filtering malicious traffic on the system buses. It also verifies the integrity of platform firmware images before any firmware code is executed and can recover corrupted firmware back to a known good state.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
RTA Furnitures Market 2020 Primary Research, Secondary Research, Growth Analysis, Size and Forecast by 2026

Cordyceps Market Primary Research, Secondary Research, Size, Trends and Forecast by 2026 | Tongrentang, Sanjiangyuan, Shenxiang

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com