Study

“Incorporating the Intel® Xeon®
processor E7 v2 family into our
cloud security solution enables
us to support more virtual
machines—and more customers
on each server. We can accelerate
deployment, facilitate rapid
scalability, and keep costs low.
– Robert Rounsavall,
Co-founder and President,
Trapezoid
Company
Trapezoid offers innovative security solutions that help verify trusted connections
between a wide range of systems and the cloud computing environments they access.
The company’s Trust Visibility Engine* is a software-as-a-service (SaaS) solution that
helps increase visibility into hardware systems, conduct analytics and compliance
reporting, track virtual machines, and facilitate remediation of security problems.
Challenge
To provide an integrated software and hardware solution, Trapezoid needs a processor
architecture that can deliver the performance to handle increasing data and
analytical workload volumes; the memory capacity to support a scalable, multi-tenant
environment; and the density to maximize computing capacity in a small physical
footprint. The company also requires a processing architecture with integrated security
capabilities to help optimize data security.
Solution
After running pilot tests to evaluate new Intel® processors, Trapezoid selected the
Intel® Xeon® processor E7 v2 family as the foundation for its cloud security solution.
As with the previous platform, the Trapezoid solution capitalizes on Intel® Trusted
Execution Technology (Intel® TXT) to verify the identity and integrity of server
hardware and software components and to track the location of workloads across
the cloud environment.
Benets
Pilot testing showed that the Intel Xeon processor E7 v2 family can deliver strong
analytics performance and maintain high standards for security and reliability. At the same
time, the new processors help create a high-density infrastructure. “Incorporating the
Intel Xeon processor E7 v2 family into our cloud security solution enables us to support
more virtual machines—and more customers—on each server,” says Robert Rounsavall,
co-founder and president of Trapezoid. “We can accelerate deployment, facilitate rapid
scalability, and keep costs low.”
Find the solution that is right for your organization. Contact your Intel representative,
visit Business Success Stories for IT Managers, or explore the Intel IT Center.
This document and the information given are for the convenience of Intel’s customer base and are provided “AS IS” WITH NO WARRANTIES WHATSOEVER, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTY
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. Receipt or possession of this document does not grant any license to any of
the intellectual property described, displayed, or contained herein. Intel
®
products are not intended for use in medical, lifesaving, life-sustaining, critical control, or safety systems, or in nuclear facility applications.
Intel does not control or audit the design or implementation of third-party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where
similar performance benchmark data are reported and conrm whether the referenced benchmark data are accurate and reect performance of systems available for purchase.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specic computer
systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating
your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance
No computer system can provide absolute security under all conditions. Intel
®
Trusted Execution Technology (Intel
®
TXT) requires a computer with Intel
®
Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS,
Authenticated Code Modules, and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/technology/security
© 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others. Printed in USA 0214/LJ/TDA/XX/PDF
Please Recycle 330172-001US
®
Cloud Visibility Empowered
Success Brief
Intel® Xeon® Processor E7 v2 Family
Cloud Security
Data Center Efciency
Securing the Cloud
Trapezoid selects the Intel® Xeon® processor E7 v2 family to increase the analytics performance and
density of its cloud security solution

Summary of content (1 pages)