编辑: LinDa_学友 | 2017-10-07 |
s robust silicon-level security features are competitive, consistent, and comprehensive.
One of AMD'
s strengths is that security and virtualization technologies are designed into every AMD processor, including our AMD Opteron?
6000 and
4000 Series processors. Regardless of the unit chosen, customers buying AMD have full access to these features. Processor Virtualization Silicon-level virtualization technology allows abstraction of physical system hardware from machine image through the hypervisor, thereby creating a firewall between attackers and physical storage. I/O Virtualization Protects memory from peripheral-based attacks, by enabling guest VMs to directly and securely use peripheral devices, such as Ethernet, accelerated graphics cards, and hard-drive controllers. Advanced Encryption Standard (AES) Instructions Provides hardware acceleration to enable fast and secure data encryption and decryption. All are important in virtualized environments and in the context of cloud computing. Since 2006, all
65 nm AMD processors except AMD Sempron? have AMD Virtualization (AMD-V?) technology. Since 2008, all
45 nm AMD processors have AMD-V. Since 2009, certain AMD chipsets have I/O virtualization. AMD products beginning with those based on the Bulldozer CPU core, including the Zambezi desktop processor and the Interlagos server processor, have AES instructions. Secure Boot/System Initialization Verifies status of multiple processes and components before initializing bios and OS kernel. Helps prevent attacks associated with firmware/software that may be out-of-date and includes known vulnerabilities, or it helps prevent attacks where there has been malicious modification to good software (e.g., someone adds malware to the boot image of Windows). n Since 2006, AMD has incorporated a silicon-level feature called SKINIT in all CPU products to support secure boot. n Before taking the next step to complete a secure boot solution with BIOS and OS integration, AMD is monitoring the market for indication that this is a real need. If and when the market sets a clear direction on this security feature, AMD is ready to work with ecosystem partners to bring a full solution to market. SKINIT does require a TPM module to enable full functionality, which will add cost. Open industry standards-based technology ensures the ability to right-size security to your needs. AMD is a founding member of the Trusted Computing Group, an international standards body that'
s developing and defining elements that promote open, vendor-neutral industry standards for trusted computing across multiple platforms, including Cloud. From Anti-theft to TPM, from malware protection to full disc encryption, AMD offers the security features you need most.
2 3
1 AMD has you covered. AMD Intel NX Bit (No eXecute) C technology used by CPUs to segregate areas of memory. Working in concert with OS can be used to prevent certain types of malware from executing harmful code. EVP (Enhanced Virus Protection) C available on all 64-bit AMD CPUs (starting in 2003) XD Bit (Execute Disable Bit) C available with Pentium
4 Prescott core (starting in 2004)1 Secure Boot/Secure Kernel Initialization C hardware extensions that provide a higher level of trust and control over computer systems. SKINIT Instruction C introduced in AMD CPUs in
2006 Trusted Execution Technology (TXT) C not all Intel processors support TXT2 Hardware-assisted Virtualization C technology that creates isolation between Virtual Machine partitions. AMD-V? C introduced in AMD processors in