Properties (70)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Technology
|
gptkbp:aimsTo |
Data in memory
|
gptkbp:developedBy |
gptkb:Intel_Corporation
|
gptkbp:enhances |
Security against physical attacks
|
https://www.w3.org/2000/01/rdf-schema#label |
Intel Memory Encryption
|
gptkbp:includes |
gptkb:Secure_Encrypted_Virtualization_(SEV)
Total Memory Encryption (TME) |
gptkbp:introduced |
2016
|
gptkbp:isAttendedBy |
Financial institutions
Healthcare_organizations |
gptkbp:isBeneficialFor |
Data security
Regulatory compliance Data confidentiality Data loss prevention Privacy compliance |
gptkbp:isCompatibleWith |
gptkb:Intel_processors
|
gptkbp:isCriticizedFor |
Data integrity
|
gptkbp:isDesignedFor |
Enterprise applications
|
gptkbp:isDiscussedIn |
Online courses
Industry conferences Technical blogs Technical forums |
gptkbp:isDocumentedIn |
Research papers
Technical specifications User guides Intel_technical_manuals |
gptkbp:isEnhancedBy |
User training
Community feedback User awareness programs Firmware_updates |
gptkbp:isEvaluatedBy |
Security researchers
Compliance auditors |
gptkbp:isExaminedBy |
White papers
|
gptkbp:isIntegratedWith |
Operating systems
Third-party applications Enterprise solutions Cloud service providers |
gptkbp:isLocatedIn |
Data centers
|
gptkbp:isPartOf |
gptkb:Intel_Software_Guard_Extensions_(SGX)
Other encryption technologies Intel's_hardware_security_features Intel's_security_portfolio Intel's_innovation_strategy Intel's_product_offerings Intel's_security_roadmap |
gptkbp:isPromotedBy |
Webinars
Intel_marketing_campaigns |
gptkbp:isPromotedThrough |
Marketing materials
Partnerships |
gptkbp:isRegulatedBy |
Data protection laws
|
gptkbp:isRelatedTo |
Cryptography
|
gptkbp:isSupportedBy |
gptkb:Intel_architecture
Intel's_customer_service Intel's_research_initiatives Intel's_development_tools |
gptkbp:isTestedFor |
Security frameworks
Security tools |
gptkbp:isTrainedIn |
Security audits
Pilot programs |
gptkbp:isUsedIn |
Government applications
Cloud computing environments |
gptkbp:isUtilizedFor |
Data encryption at rest
Secure data processing |
gptkbp:isUtilizedIn |
Research institutions
Virtual machines Benchmark tests Security assessments |
gptkbp:provides |
Data protection
|
gptkbp:supports |
Confidential computing
|
gptkbp:uses |
Hardware-based_encryption
|