La version du navigateur que vous utilisez n'est pas recommandée pour ce site.Nous vous conseillons de mettre à niveau vers la version la plus récente de votre navigateur en cliquant sur l'un des liens suivants.
Veuillez nous excuser, ce PDF peut uniquement être téléchargé
Intel, Parallels Developer Cloud Infrastructure GuideAudience and PurposeFor cloud service providers, infrastructure hosts, and enterprise IT administrators who are looking to enhance or build their public or private cloud infrastructure, the decision to use a cloud for the delivery of IT services needs to include a security strategy which protects the various layers of the deployments. This reference architecture presents a complete model of a Parallels* Trusted Compute pool deployment on Intel® Xeon® processor 5600 series servers, and addresses how to establish a trusted platform on the physical server layer of a public or private cloud.Since the creation and operation of a cloud requires integration and customization to existing IT infrastructure and business requirements, it is not expected that this paper can be used as is. For example, the adaptation to existing networks and the identification of the end-to-end security requirements are out of scope for this paper. Therefore, it is expected that the user of this paper will make appropriate adjustments to any deployments to meet specific customer security requirements, especially given the variations in threat levels and approach points that face users when they operate in a public or private cloud usage model. Read the full Infrastructure Guide.
Télécharger le PDF
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Parallels discusses building a cloud with Trusted Compute Pools
Trusted compute pools with Intel® TXT
HyTrust discusses building a secure cloud computing solution.
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.