Security

Chat Now

Intel® Trusted Execution Technology

Making cloud safer, one Trusted Computing Pool at a time.

As the cloud industry evolves, so does the volume, complexity, and sophistication of attacks on IT infrastructure. Intel TXT provides hardware-assisted security technologies to build a secure foundation.

Add Intel® Trusted Execution Technology (Intel® TXT) to enhance your security portfolio. SoftLayer is the first cloud company to offer the solution as an additional method to secure your infrastructure.



Trusted Server

Your hardware and pre-launch software have been vetted and are in a known good state.

Easy to Order

Select Intel TXT on the order form and when your server is deployed it will be enabled with TXT.

Stay Online

Protect your environment against attacks that could potentially lead to downtime.

Intel® TXT Partnership Overview

With Intel Trusted Execution Technology, you have peace of mind when deploying and securing cloud resources. A processor-based, tamper-resistant environment compares key server components to previously known, trusted states prior to booting. To learn more, watch this short informative partner video.

Example Use Cases

Large IT Departments

Trying to control cost of ownership while maintaining robust security practices takes hard work. Intel TXT uses elbow grease and a code to ensure that the system is intact during the boot process. It’s just another level of confidence knowing the servers being added are all part of a trusted compute pool.


Big Banks

When it comes to investments and money, financial institutions must meet specific security guidelines to protect customers’ bottom lines. To keep up with financial growth, deploy additional servers when needed. Adding Intel TXT ensures each resource added has been verified and checked for integrity against server hardware components such as BIOS, firmware and hypervisor software.


To order Intel Trusted Execution Technology (Intel TXT), chat with a member of our sales team.


Building a chain of trust.

The power of Intel TXT establishes a root of trust providing the necessary underpinnings for successful evaluation of the computing platform and its protection. It features a:

  • dynamic root of trust for measurement (DRTM)
  • data protection in case of improper shutdown
  • measurement and verification of launched environments

During the boot process, the Trusted Platform Module (TPM) holds the computer generated keys for encryption which essentially is a code that measures, extends, verifies, and executes—over and over to establish a system as trusted.


Enhancing your security.

Do your security and compliance teams require a Trusted Boot to ensure systems start up in a known good state? Add a layer of defense with Intel TXT. Once select servers are provisioned with Intel TXT, the infrastructure level building blocks will enable a customer to build trusted compute pools.

Intel TXT available on select servers:

  • Intel Xeon E3-1270 v3
  • Intel Xeon E5-2620 (v3, v4)
  • Intel Xeon E5-2650 (v3, v4)
  • Intel Xeon E5-2690 (v3, v4)
  • Intel Xeon E5-4620 (v1, v2)
  • Intel Xeon E5-4650
  • Intel Xeon E7-4820 (v2)
  • Intel Xeon E7-4850 (v1, v2)