Sorry, you need to enable JavaScript to visit this website.

News & Blogs

AMI TruE® Trusted Environment Platform Security Solution For Confidential Computing In Cloud And Edge

Due to its privileged level of execution and difficulty for operating systems and security software to detect unauthorized changes, system firmware is quickly becoming the newest and most prominent target for malicious actors – making it an area that demands increasing focus from security experts, system manufacturers and others. Intel TXT and TPM, coupled with complying BIOS provides firmware...

Enabling advanced key usage and management in encrypted container images

In this article, we’d like to dig deeper into a specific aspect of protecting encrypted container images and key management. We will talk about several shortcomings of naive key management and provide a glimpse of the new features in ocicrypt, the keyprovider extensibility that addresses this problem, and an example of a high assurance architecture.   External Link:  ...

Level Up: Get End-to-end Machine Identity Lifecycle Protection with Intel® SGX

One important challenge for many organizations has been to secure the private key that is used to prove the authenticity of the server identified by a certificate. Often, these private keys are protected in a suboptimal manner that incurs prohibitively expensive overhead or undesirably high risk. Combined with machine identity management, Intel® Software Guard Extensions  (Intel® SGX)...

Trusted Container Platform with a Five-Level Security Model

In this blog, we propose a trusted container framework with innovative technologies to ensure the security of your container platform. With a five-level model, the proposed framework can help address security concerns in all hardware and software levels of a container-based platform. We first introduce the five levels of the security model by describing the building blocks of a trusted container...