Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

TECH NEWS | Intel processors to utilize iGPU for malware scanning, pushing security down to the hardware

0

Intel announced two new technologies: Threat Detection Technology (TDT) and Security Essentials — hardware-based built-in security features across Intel processors for threat detection without compromising system performance.

supermicro-sc847a-motherboard-with-intel-xeon-e5620-cpu

Last week during the RSA Conference 2018, Intel announced two new technologies — Threat Detection Technology (TDT) and Security Essentials. These are hardware-based built-in security features across Intel processors for threat detection without compromising system performance.

Intel’s Threat Detection Technology (TDT) offers hardware-level telemetry helping security products detect new classes of threats and exploits. It’s two main capabilities are Accelerated Memory Scanning and Advanced Platform Telemetry.

Accelerated Memory Scanning allows antivirus programs to scan and detect memory-based malware attacks with reduced impact on performance and power consumption with the help of Intel’s integrated GPU.
According to Intel’s early tests, using the new GPU-accelerated scanning technique helps reduce CPU utilization for malware threat scans from 20% to around 2%.

[youtube https://www.youtube.com/watch?v=0jDyfNhKwlM&w=640&h=480]

On the other hand, the Intel Advanced Platform Telemetry makes use of cloud-based machine learning and endpoint data collection to effectively identify potential security threats, reducing false positives and minimizing performance impact.

The Intel Thread Detection Technology solution will be available for computers with 6th, 7th, and 8th generation Intel processors, but it is up to third-party antivirus vendors to actually utilize the feature. Microsoft is going to be one of the first companies to make use of Intel’s Threat Detection Technology (TDT) with Windows Defender Advanced Protection Threat (ATP) this month.

The next security solution introduced by Intel is the Security Essentials, a built-in toolkit which has different hardware-based security features for Intel Core, Xeon, and Atom line of processors. Intel Security Essentials offer a chain of trust to protect against a wide range of attacks:

— Hardware Root of Trust – Cryptographic keys protected by hardware;

— Small Trusted Computing Base – Protecting keys, IDs, and data using hardware trusted platform module (TPM);

— Defence in Depth – Hardware and software protection;

— Compartmentalization – Hardware-enforced barriers between software components;

— Direct Anonymous Authentication – Cryptographic schemes to offer anonymous authentication of a device for privacy (especially for IoT devices);

— HW Security escalation – Enabling hardware acceleration of cryptographic calculation, antivirus scanning, and key generation

All of these seems to be a response to the recent Meltdown and Spectre vulnerabilities that has affected virtually almost every last generation processors from every manufacturers down to the hardware level.

ira
by Ira James, contributing writer
Contributing writer at  | Website

Leave a Reply

Your email address will not be published. Required fields are marked *