Building Trust into the Cloud

By Tracie Zenti

Tracie Zenti is a Product Marketing Manager for the Data Center and Connected Systems Division.  She has extensive manageability and security experience having focused on these areas for the past 8 years of her 13 year Intel career.  Her prior experience includes IT management, IT Program management and IT Consulting. Tracie is currently focused on Intel Trusted Execution Technology and ensuring this technology has a rich ecosystem of partners.  Tracie received a degree from the University of Oregon in 1994.

VMworld 2013 is a good time to step back and reflect on virtualization and cloud computing: Where we’ve been, where we are, and what’s on the horizon.

In 2011 the mantra was deliver enabled platforms (hardware and software), which led to focusing on enabling solutions providers in 2012. The evolution continues and in 2013 we are now witnessing end user deployments.

The secure, enterprise-class cloud has moved from proof-of-concept to reality, enabling IT managers or cloud service providers to offer important differentiated services to business organizations. In large part, this is due to companies like VMware, whose solutions are taking advantage of Intel® Trusted Execution Technology (Intel® TXT). There is also a growing network of management vendors and solution providers that provide Intel TXT integration, including HyTrust, Science Logic, M2Mi, Symantec, Trapezoid, Virtustream, Dell, CSC and Savvis and others.  Additionally, OpenStack, offers Intel TXT capabilities.  All this mean organizations can now deploy the cloud with confidence.

Security is always top-of-mind for IT pros, especially but not limited to those working in government and highly regulated industries such as healthcare and financial services. As organizations make the move toward cloud computing, these IT administrators must ensure that they meet stringent security requirements for sensitive data and workloads.

Intel TXT has become a key technology for building trusted compute pools. The growing ecosystem of Intel TXT capable software and solution providers enables enterprise organizations to protect their sensitive workloads in cloud infrastructures.


Intel TXT and trusted compute pools address many of the compliance and visibility concerns that have been holding back cloud adoption, at least for highly regulated industries or organizations with sensitive data and workloads. Consider that:

  • Without visibility into prelaunch components, you have no idea if systems are misconfigured or infected with malware.
  • Many cloud infrastructures have a one-size-fits-all approach to safeguarding compute workloads to maximize efficiency and minimize cost, but they leave IT administrators few options for controlling and managing computing resources for sensitive workloads.
  • IT administrators may be required to meet stringent standards of compliance but lack the tools to ensure (and audit) that cloud-based data is protected to the level required by regulation and/or enterprise audit requirements.

Intel TXT found in Intel® Xeon® processors helps reduce the security risks and compliance complications derived from virtualized platforms. It works by providing a hardware-based, tamper-resistant environment that compares firmware, BIOS, and operating systems or hypervisor code to known good configurations to establish a measured, trusted environment prior to launch. Intel TXT also provides an enforcement point for launch-time system integrity and a reporting mechanism that provides visibility into system status to assist audit procedures.

Intel continues its work with VMware and other technology leaders to strengthen the security of virtualized platforms, so even organizations with strict compliance requirements and sensitive data and workloads can use the cloud with confidence.

To learn more about Intel TXT and trusted compute pools, attend the Intel session at VMWorld 2013

Motivations and Solution Components for Enabling Trusted Geolocation in the Cloud.  A Panel discussion on the National Institute for Standards and Technology (NIST) Reference Architecture. Panel members include:

  • Murugiah Souppaya, Security Leader and Architect at NIST
  • Hemma Prafullchandra, Chief Technology Officer and SVP, Products at Hytrust
  • Selim Aissi, Head of Global Enterprise Architecture, GIS, Technology Group at Visa

Stop by the Intel booth (#1029) to meet our experts and listen to security-related Smart Talks, which take place as follows.

Monday, August 26

Wednesday, August 28

2:30 - Concentration of Risk and Insider Threat

11:30 – Creating Differentiated Secure Service Offerings

3:30 - Hypervisor to the Metal, Trust and Assurance for Virtualized Infrastructures

3:30 – Hardware-Assisted Data Protection with Intel and Vormetric

4:30 - Moving to a More Secure IT: Data Center, Cloud Client