Stronger Endpoint Security Starts with a Hardware-Based Foundation

Total Page:16

File Type:pdf, Size:1020Kb

Stronger Endpoint Security Starts with a Hardware-Based Foundation White Paper 4th Generation Intel® Core™ Processors and Intel® Atom™ Processors Intel and Windows 8.1* Mobility Stronger Endpoint Security Starts with a Hardware-Based Foundation Whether you use traditional management or mobile management solutions, keep your enterprise safer with devices built on a framework of hardware-assisted security Mobile Devices Need Stronger Protections When it comes to convenience and access in the enterprise, this is a golden age. Users can access corporate resources and data from their smartphones, tablets, or PCs from almost anywhere at any time. Of course, what’s convenient and productive for your users can be a security and management headache for your IT administrators as they strive to take advantage of increased mobility and the bring-your-own-device (BYOD) trend while securing corporate data. The personal nature and associated usage patterns of mobile devices make them prime targets for attacks. Users are not known for their security awareness. They install all sorts of apps on their mobile devices without regard for the security of those apps. Users allow apps to have all the device permissions the apps ask for even when the permissions are overreaching. Mobile devices are often shared between family members with little oversight over how they’re used or what websites and data they access. The devices also might frequent wireless networks that have dubious levels of security. Users then use these devices to access both personal and corporate data. These usage patterns put mobile devices and their users at higher risk from identity theft, malware, and other stealthy threats that can infiltrate systems at deeper levels to steal data or even take control of a device. Windows 8.1* now makes mobile management of PCs possible by adding more granularity for control of non-domain-joined mobile devices and support for mobile device management (MDM) products. By supporting the Open Mobile Alliance Device Management (OMA DM) API, Windows 8.1 enables you to manage devices through a low-overhead agent without needing to deploy a full management client on each device. But MDM products don’t offer the same level of control as traditional domain-joined management solutions. To strengthen endpoint security, you need a solution that builds from the silicon up to better ensure the integrity of the system even before the operating system starts. By using tablets, Ultrabook™ devices, 2 in 1 devices, and laptops powered by 4th generation Intel® Core™ processors and Intel® Atom™ processors running Windows 8.1, you can complement your MDM solution with strong, hardware-assisted security and with more comprehensive management, speed, and efficiency.1 Stronger Endpoint Security Starts with a Hardware-Based Foundation Table of Contents Strong Security Starts before the Each time the device is started, these Operating System combined technologies help ensure Mobile Devices Need that the deepest levels of the system Hardware-assisted security adds layers Stronger Protections . 1 are not tampered with. But hardware- of protection that stay with the device enhanced security doesn’t end with the Strong Security Starts before regardless of how it is used or managed. boot process. Intel Platform Protection the Operating System . 2 Even before the operating system starts, Technology with Intel® OS Guard helps deeper layers of security are working Block Stealthy Malware . 2 protect the deepest levels of your to help prevent stealth malware, like a Provide Safer Authentication . 3 system, even if an application has been rootkit, from injecting itself and taking compromised.2 This unique Intel feature Secure Your Company’s Data . 3 over a system. For example, during the helps prevent hackers from remotely initial Windows 8.1 boot process, Intel® Strengthen Encryption taking over a user’s PC by preventing Platform Protection Technology with with True Random Numbers . 4 malicious code in compromised application BIOS Guard and Boot Guard helps prevent Meet the Mobile Device memory from launching low-level, privilege unauthorized software and malware from Security Challenge . 5 escalation attacks. taking over boot blocks that are critical to a system’s function.1 Unified Extensible Block Stealthy Malware Firmware Interface (UEFI) Secure Boot continues early protections by ensuring Once stealthy malware infects the system, only a properly signed operating system it stays invisible to antivirus software. loader is used during startup. That gives the threat an opportunity to take control of the system, steal Windows 8.1 Trusted Boot provides confidential information, and spread to additional startup protections by using the other systems. Mobile device users need UEFI root of trust to ensure that the rest run-time protections to help block stealthy of the boot components are secure and threats—malware that can infect deeper have integrity. At the same time, Windows levels of the system and go undetected by 8.1 Measured Boot takes measurements software-only solutions. of each component—from firmware up through the boot start drivers and even The strongest protection from malware anti-malware drivers—and securely comes from solutions that don’t rely on locks away the measurements in a knowledge of existing threats. By pairing built-in protections from Windows 8.1 2 million trusted platform module (TPM), such as Intel® Platform Trust Technology. The devices powered by Intel Core processors Stealthy rootkit malware samples measurements collected by Measured with McAfee Deep Defender* software, documented by McAfee Labs in 2012, Boot can be securely accessed from Intel you can detect and block advanced, hidden compared to 42 samples in 2007.3 Platform Trust Technology by third-party attacks in real time before they cause security software in order to compare the damage. McAfee Deep Defender relies on current state of the system against the McAfee DeepSAFE* technology, a solution known-good state established by Secure jointly developed by Intel and McAfee that Boot. By establishing and verifying a delivers real-time, kernel-level monitoring trusted state, you can better ensure the of memory. This unique connection to integrity of the system and help identify hardware with behavioral-based detection and block malware before it takes root. makes McAfee Deep Defender more 2 Stronger Endpoint Security Starts with a Hardware-Based Foundation effective than software-based solutions. or fumble with a physical token, while the wrong hands. With mobile devices In fact, in testing against top competitors still benefiting from the stronger security off the company network and outside of by AV-TEST labs, McAfee Deep Defender offered by two-factor authentication. domain control, this can be a challenging was the only product to detect 100 For devices powered by Intel Atom proposition; but several Intel hardware- percent of stealthy rootkits.4 processors or Intel Core processors with assisted technologies can help you keep Intel® vPro™ technology,7 Intel IPT with PKI your data away from prying eyes. With strong, proactive protections from offers an alternative to physical smart Intel OS Guard and McAfee Deep Defender, cards that is easier to deploy and less you can stop more kernel-level attacks expensive. Intel IPT with PKI has built- before they have a chance to propagate in hardware capabilities to store digital and threaten mobile devices based on Intel certificates in firmware for secure VPN processors, even when the devices are or Secure Sockets Layer (SSL) web site 17, 317,18 4 non-domain-joined or are inaccessible from authentication, to authenticate a user and your corporate network. Identities exposed in 447 reported a server to each other, and to encrypt and breaches in 2012.6 digitally sign e-mail and documents. Even if Provide Safer Authentication you already have a PKI implementation in Providing secure access to resources has your organization, Intel IPT with PKI could Encryption is one of the best ways to always been a challenge for organizations. save you money by eliminating the need keep your data safer, but organizations That challenge has grown recently, due to purchase and support traditional smart are often reluctant to widely deploy to the expanding landscape of mobile cards or other token storage options. In encryption because of the overhead it devices, applications, and busy employees addition, on devices powered by Intel entails. Intel helps you remove the barriers on the go. To better protect your assets Core processors, Intel IPT with PKI can be to deployment with Intel® Advanced and users, you need to provide something used with Protected Transaction Display Encryption Standard New Instructions stronger than a simple user name and (PTD) technology, which lets you create (Intel® AES-NI),8 a cryptographic password scheme for authentication and secure PIN pads to protect passwords and instruction set that accelerates AES data VPN access. With Intel® Identity Protection numeric key entries from screen-scraping encryption and decryption on devices Technology (Intel® IPT),5 Intel provides a and key-logging malware. powered by Intel Core processors and hardware root of trust that can be used by Intel Atom processors. Because of the multi-factor authentication solutions on Secure Your Company’s Data enhanced cryptographic performance of devices powered by Intel Core processors Data is your company’s most valuable Intel AES-NI, IT can reap the benefits of and Intel Atom processors. asset. From customer information to encryption
Recommended publications
  • Intel® Omni-Path Architecture (Intel® OPA) for Machine Learning
    Big Data ® The Intel Omni-Path Architecture (OPA) for Machine Learning Big Data Sponsored by Intel Srini Chari, Ph.D., MBA and M. R. Pamidi Ph.D. December 2017 mailto:[email protected] Executive Summary Machine Learning (ML), a major component of Artificial Intelligence (AI), is rapidly evolving and significantly improving growth, profits and operational efficiencies in virtually every industry. This is being driven – in large part – by continuing improvements in High Performance Computing (HPC) systems and related innovations in software and algorithms to harness these HPC systems. However, there are several barriers to implement Machine Learning (particularly Deep Learning – DL, a subset of ML) at scale: • It is hard for HPC systems to perform and scale to handle the massive growth of the volume, velocity and variety of data that must be processed. • Implementing DL requires deploying several technologies: applications, frameworks, libraries, development tools and reliable HPC processors, fabrics and storage. This is www.cabotpartners.com hard, laborious and very time-consuming. • Training followed by Inference are two separate ML steps. Training traditionally took days/weeks, whereas Inference was near real-time. Increasingly, to make more accurate inferences, faster re-Training on new data is required. So, Training must now be done in a few hours. This requires novel parallel computing methods and large-scale high- performance systems/fabrics. To help clients overcome these barriers and unleash AI/ML innovation, Intel provides a comprehensive ML solution stack with multiple technology options. Intel’s pioneering research in parallel ML algorithms and the Intel® Omni-Path Architecture (OPA) fabric minimize communications overhead and improve ML computational efficiency at scale.
    [Show full text]
  • Intel Server Board SE7320EP2 and SE7525RP2
    Intel® Server Board SE7320EP2 and SE7525RP2 Tested Hardware and Operating System List Revision 1.0 June, 2005 Enterprise Platforms and Services Marketing Revision History IntelP®P Server Board SE7320EP2 and SE7525RP2 Revision History Revision Date Number Modifications June 2005 1.0 First Release ii Revision 1.0 IntelP®P Server Board SE7320EP2 and SE7525RP2 Disclaimers Disclaimers THE INFORMATION IN THIS DOCUMENT IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Information in this document is provided in connection with Intel® products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel retains the right to make changes to its test specifications at any time, without notice. The hardware vendor remains solely responsible for the design, sale and functionality of its product, including any liability arising from product infringement or product warranty. Copyright © Intel Corporation 2005. All rights reserved. Intel, the Intel logo, and EtherExpress are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
    [Show full text]
  • Intel® Omni-Path Fabric Software in Red Hat* Enterprise Linux* 8.1 Release Notes
    Intel® Omni-Path Fabric Software in Red Hat* Enterprise Linux* 8.1 Release Notes Rev. 3.0 April 2020 Doc. No.: K65222, Rev.: 3.0 You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. All product plans and roadmaps are subject to change without notice. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel technologies may require enabled hardware, software or service activation. No product or component can be absolutely secure. Your costs and results may vary. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others. Copyright © 2019–2020, Intel Corporation. All rights reserved. Intel® Omni-Path Fabric Software in Red Hat* Enterprise Linux* 8.1 Release Notes April 2020 2 Doc. No.: K65222, Rev.: 3.0 Contents—Intel® Omni-Path Fabric Contents 1.0 Overview of the Release............................................................................................... 5 1.1 Audience..............................................................................................................
    [Show full text]
  • Pro Processor Workstation Performance Brief
    Pentium Pro Processor Workstation Performance Brief June 1997 Order Number: 242999-003 Pentium® Pro Processor Workstation Performance Brief Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel's Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The Pentium® Pro processor may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an ordering number and are referenced in this document, or other Intel literature, may be obtained from: Intel Corporation P.O. Box 7641 Mt. Prospect IL 60056-7641 or call 1-800-879-4683 or visit Intel’s website at http:\\www.intel.com Copyright © Intel Corporation 1996, 1997.
    [Show full text]
  • Intel® Omni-Path Architecture Overview-Partner.Sales.Training
    Intel® Omni-Path Architecture: Overview August 2017 Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY RELATING TO SALE AND/OR USE OF INTEL PRODUCTS, INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT, OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life-saving, life- sustaining, critical control or safety systems, or in nuclear facility applications. Intel products may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel may make changes to dates, specifications, product descriptions, and plans referenced in this document at any time, without notice. This document may contain information on products in the design phase of development. The information herein is subject to change without notice. Do not finalize a design with this information. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. Intel Corporation or its subsidiaries in the United States and other countries may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights.
    [Show full text]
  • Initial Experience with 3D Xpoint Main Memory
    Initial Experience with 3D XPoint Main Memory Jihang Liu Shimin Chen* State Key Laboratory of Computer Architecture State Key Laboratory of Computer Architecture Institute of Computing Technology, CAS Institute of Computing Technology, CAS University of Chinese Academy of Sciences University of Chinese Academy of Sciences [email protected] [email protected] Abstract—3D XPoint will likely be the first commercially available main memory NVM solution targeting mainstream computer systems. Previous database studies on NVM memory evaluate their proposed techniques mainly on simulated or emulated NVM hardware. In this paper, we report our initial experience experimenting with the real 3D XPoint main memory hardware. I. INTRODUCTION A new generation of Non-Volatile Memory (NVM) tech- nologies, including PCM [1], STT-RAM [2], and Memris- tor [3], are expected to address the DRAM scaling problem and become the next generation main memory technology Fig. 1. AEP machine. in future computer systems [4]–[7]. NVM has become a hot topic in database research in recent years. However, previous First, there are two CPUs in the machine. From the studies evaluate their proposed techniques mainly on simulated /proc/cpuinfo, the CPU model is listed as “Genuine In- or emulated hardware. In this paper, we report our initial tel(R) CPU 0000%@”. Our guess is that the CPU is a test experience with real NVM main memory hardware. model and/or not yet recognized by the Linux kernel. The 3D XPoint is an NVM technology jointly developed by CPU supports the new clwb instruction [9]. Given a memory Intel and Micron [8]. Intel first announced the technology address, clwb writes back to memory the associated cache in 2015.
    [Show full text]
  • Intel® Omni-Path Software — Release Notes for V10.9.2
    Intel® Omni-Path Software Release Notes for V10.9.2 Rev. 1.0 March 2019 Doc. No.: K54191, Rev.: 1.0 You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel, the Intel logo, Intel Xeon Phi, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. Copyright © 2019, Intel Corporation. All rights reserved. Intel® Omni-Path Software Release Notes for V10.9.2 March 2019 2 Doc. No.: K54191, Rev.: 1.0 Contents—Intel® Omni-Path Fabric Contents 1.0 Overview of the Release............................................................................................... 5 1.1 Audience..............................................................................................................
    [Show full text]
  • Intel® Omni-Path Software — Release Notes for V10.8.0.2
    Intel® Omni-Path Software Release Notes for V10.8.0.2 Rev. 1.0 January 2019 Doc. No.: K48500, Rev.: 1.0 You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel, the Intel logo, Intel Xeon Phi, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. Copyright © 2019, Intel Corporation. All rights reserved. Intel® Omni-Path Software Release Notes for V10.8.0.2 January 2019 2 Doc. No.: K48500, Rev.: 1.0 Contents—Intel® Omni-Path Fabric Contents 1.0 Overview of the Release............................................................................................... 5 1.1 Important Information...........................................................................................
    [Show full text]
  • Product Change Notification 104637 – 00
    Product Change Notification 104637 – 00 Information in this document is provided in connection with Intel® products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel® products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel® products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Should you have any issues with the timeline or content of this change, please contact the Intel Representative(s) for your geography location listed below. No response from customers will be deemed as acceptance of the change and the change will be implemented pursuant to the key milestones set forth in this attached PCN. Americas Contact: [email protected] Asia Pacific Contact: [email protected] Europe Email: [email protected] Japan Email: [email protected] Copyright © Intel Corporation 2004. Other names and brands may be claimed as the property of others. AlertVIEW, AnyPoint, AppChoice, EtherExpress, FlashFile, i386, i486, i960, Intel, Celeron, Intel486, Intel740, IntelDX2, IntelDX4, IntelSX2, Itanium, LANDesk, LanRover, Pentium, Xeon, Intel Xeon, NetMerge, NetStructure, OverDrive, Paragon, PDCharm, StrataFlash is a trademark or registered trademarks of Intel corporation or its subsidiaries in the United States and other countries.
    [Show full text]
  • Intel® Omni-Path Fabric Software in Red Hat* Enterprise Linux* 8.0 Release Notes
    Intel® Omni-Path Fabric Software in Red Hat* Enterprise Linux* 8.0 Release Notes Rev. 2.0 December 2019 Doc. No.: K51383, Rev.: 2.0 You may not use or facilitate the use of this document in connection with any infringement or other legal analysis concerning Intel products described herein. You agree to grant Intel a non-exclusive, royalty-free license to any patent claim thereafter drafted which includes subject matter disclosed herein. No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel product specifications and roadmaps. The products described may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel, the Intel logo, Intel Xeon Phi, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. Copyright © 2019, Intel Corporation. All rights reserved. Intel® Omni-Path Fabric Software in Red Hat* Enterprise Linux* 8.0 Release Notes December 2019 2 Doc. No.: K51383, Rev.: 2.0 Contents—Intel® Omni-Path Fabric Contents 1.0 Overview of the Release..............................................................................................
    [Show full text]
  • Eindhoven University of Technology MASTER Evaluation of Real-Time
    Eindhoven University of Technology MASTER Evaluation of real-time operating systems, development methdologies and CASE-tools for PC based process-control Lemmers, J.H.M. Award date: 1996 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree. The grade received is not published on the document as presented in the repository. The required complexity or quality of research of student theses may vary by program, and the required minimum study period may vary in duration. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain Eindhoven University of Technology Faculty of Electrical Engineering Section : Measurement and Control Evaluation of real-time operating systems, development methodologies . and CASE-tools for PC based process-control by J.H.M Lemmers M. Sc. Thesis Carried out trom September 1995 to August 1996 Commissioned by Prof. Dr. Ir. P.P.J. van den Bosch Under supervision ot Ir. C.A.M. v.d. Brekel and Ir. J.W.J.J.
    [Show full text]
  • Analyzing the Performance of Intel Optane DC Persistent Memory in App Direct Mode in Lenovo Thinksystem Servers
    Front cover Analyzing the Performance of Intel Optane DC Persistent Memory in App Direct Mode in Lenovo ThinkSystem Servers Introduces DCPMM App Direct Explores performance capabilities of Mode persistent memory Establishes performance Discusses configurations for optimal expectations for given workloads DCPMM performance Tristian “Truth” Brown Travis Liao Jamie Chou Abstract Intel Optane DC Persistent Memory is the latest memory technology for Lenovo ThinkSystem servers. This technology deviates from contemporary flash storage offerings and utilizes the ground-breaking 3D XPoint non-volatile memory technology to deliver a new level of versatile performance in a compact memory module form factor. This paper focuses on the low-level hardware performance capabilities of Intel Optane DC Persistent Memory configured in App Direct Mode operation. This paper provides the reader with an understanding of workloads to produce the highest level of performance with this innovative technology. At Lenovo Press, we bring together experts to produce technical publications around topics of importance to you, providing information and best practices for using Lenovo products and solutions to solve IT challenges. See a list of our most recent publications at the Lenovo Press web site: http://lenovopress.com Do you have the latest version? We update our papers from time to time, so check whether you have the latest version of this document by clicking the Check for Updates button on the front page of the PDF. Pressing this button will take you to a web page that will tell you if you are reading the latest version of the document and give you a link to the latest if needed.
    [Show full text]