In this episode of Intel Chip Chat, Pat Conte, Senior VP of Global Business Development at HyTrust talks about the ever-evolving security landscape and the work they are doing to deliver a more secure cloud infrastructure. HyTrust is a cybersecurity company focused on locking down virtual infrastructure that support all cloud environments, and protecting the critical data within the cloud workloads. Security is a top priority for IT managers, and HyTrust partners with Intel to help secure the underlying infrastructure. Pat chats about BoundaryControl, a HyTrust solution that integrates Intel\xae Trusted Execution Technology (Intel TXT) and Intel\xae Trusted Platform Modules (Intel TPM) technologies to essentially put a boundary around a designated server or servers to help ensure that workload is only getting executed on the server that you designate it to. New capabilities and evolving landscape gives Intel and HyTrust the opportunity to enhance encryption and geo-fencing and adopt new Intel\xae Security Technologies, like the 2nd Generation Intel\xae Xeon Scalable Processors with Intel\xae Security Libraries for Data Centers (Intel\xae SecL\u2013DC).\nMore Information:\n\nHyTrust and Intel Ease Integration of Trusted Compute: https://www.hytrust.com/blog/hytrust-and-intel-ease-integration-of-trusted-compute/\n\nIntel technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.\n\nIntel, the Intel logo, and Xeon are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. \n\n*Other names and brands may be claimed as the property of others.\n\n\xa9 Intel Corporation