Feeds

Next-gen Intel vPro platform to get hardware encryption

Desperate Danbury

Choosing a cloud hosting partner with confidence

IDF Intel's next-generation 'Eaglelake' chipset family, due for release next year, will feature a built-in data protection engine with the ability to encrypt all the files on your hard drive, the chip giant announced this week.

It calls the engine 'Danbury'. Together with an chipset-integrated Trusted Platform Module, Danbury will be part of Eaglelake chipsets for vPro-branded PCs. It'll be part of the third generation of vPro, codenamed 'McCreary', which will also feature Intel's Advanced Management Technology (AMT) 5.0.

Intel McCreary - third-generation vPro
Intel's McCreary: integrated hard drive encryption

Danbury provides a hardware encryption engine for drive-level data security. The encryption keys are created and maintained within the chipset itself, so there's no need to place them in memory where they could be accessed by malware.

Danbury ties into the TPM, which is one reason why Intel plans to move that module into the chipset packaging. Plenty of desktop and laptop PCs already contain a TPM, implemented as a separate chip. Integrating it will help reduce system costs.

It'll be left to software to provide a front end to all this for the user, Intel said, presumably through utilities and the operating system.

McCreary is scheduled to ship in the second half of 2008.

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.