ALL >> Computers >> View Article
Intel’s New Technology Will Allow Microsoft To Use Integrated Graphics For Malware Scanning
Total Articles: 80
Recently, Intel has announced the development of new virus scanning feature which allows the user’s for better threat detection on cloud services and Windows PCs operating system that builds upon the silicon-level functionality.
These capabilities are called Accelerated Memory Scanning and Intel Advanced Platform Telemetry. It will help the Microsoft in improving detection and fixing of some advanced cyber threats and exploits. Intel has also launched some Security Essentials, including numerous critical root of trust hardware security capabilities, for Intel Xeon, Intel Atom processors, and Intel Core.
Accelerated Memory Scanning
According to the Intel, many of the current virus scanning methods can easily detect memory-based malware, but it will end up using critical CPU performance. With Intel’s new technology, the chipmaker plans to offload the work to its CPUs’ integrated graphics hardware.
According to a report of Intel’s internal tests, the utilization of CPU can drop from 20 percent to 2 percent directly. As Intel has a partnership with Microsoft to incorporate Accelerated Memory Scanning into the Windows Defender Advanced Threat Protection, and its security framework for enterprise and business customers.
Intel Advanced Platform Telemetry
The Intel’s second development said that combine the platform telemetry with the machine learning algorithms for improved detection of advanced threats, which helps in cutting down on some false positives and increasing the overall performance. Now, Intel has tied up with Cisco to integrate this technology with the Cisco Tetration platform, which offers the security of data and cloud protection.
Rick Echevarria, Vice President of Intel Corporation, said I am very excited about the progress we are making, together with these key partners, to establish innovations across software and silicon to help and protect the customers from emerging threats.
The Intel Corporation has also announced the introduction of Intel Security Essentials which is describing as a reliable set of critical security technologies across its CPU lines, which designed directly into the hardware. These include some existing features like trusted execution, accelerated encryption, and secure booting.
Echevarria said This standard set of capabilities would accelerate the trusted computing as the customers build solutions which rooted in hardware-based protections. Additionally, these capabilities will directly integrate into Intel silicon which is designed to improve the security posture of computing and also for lowering the cost of deploying security solutions and also minimizes the impact of security on the performance.
However, Intel was newly caught up in a massive hardware susceptibility scandal wherein the two CPU design faults known as specter and meltdown were discovered to have affected the millions of the computer company’s chips which are already in use around the world.
The tech giant has promised to remove these faults at the beginning of forthcoming Intel Xeon Scalable processors, which are ready to be shipped in the second half of the year 2018.
Computers Articles1. Avail It Connect Data Recovery Services To Restore Data From Failed Hard Drives
2. Import Data From Excel To Tally Erp 9 Easily
Author: Sanjay Jobanputra
3. Habits That You Need To Change While Working On A Computer
Author: Edward D Lemos
4. Easy To Use Accounting Software| File Vat Returns With Fta Approved Software- Perfonec
Author: Akansha Surana
5. How Does Mcafee On-demand Scanning Works?
Author: Maria Williams
6. How To Increase Life Of Ink Cartridges And Save Money?
Author: Jackson Perry
7. Microsoft Products Issues Troubleshooting Guide!24x7 Availability & Support.
Author: Joby Antony
8. Keep Your Private Life Private With Hide.me Vpn
Author: Jamie R Clarke
9. Usb Safeguard - Password Protection Software Usb Pen Drive
Author: Andrew Jordy
10. Craft Professional Drawings With Nanocad Plus
Author: Nick Giles
11. China’s Cyber Attacks On Taiwan Are Hard To Detect
Author: sara williams
12. What Is Logo Usbs Constructed Of?
Author: Magdalene Munter
13. Can I Check The Status Of My Dell Laptop Repair?
14. How To Fix Chrome High Disk Usage In Windows 10?
Author: bella watson
15. Novel Transmitter Secures Wireless Data From Cyber Criminals
Author: bella watson