• Contact Us
ami logo
  • ami logo
  • Solutions
    • Open Source
      • Aptio® and MegaRAC® OpenEditions, Available on GitHub Today

        The key to MegaRAC OpenEdition’s flexibility is a robust “common core” concept that delivers a highly-managed source base with high ROI, and a complete Service Processor Solution for wide product deployments. MegaRAC OpenEdition includes dedicated support, code patches and security advisories that all AMI customers trust and expect.

        Aptio OpenEdition, with all the benefits of Aptio V, now available in open source. Firmware features support for the latest UEFI specifications and the security, fast boot and touch support that today’s platforms require.

    • Confidential Computing
      • AMI TruE® enabling Confidential Computing

        Leveraging Intel® SGX secure enclaves, AMI TruE enables secure computing, easy to deploy workload attestation and secure application keys without compromising confidentiality – to deliver a secure data center solution that is scalable, extensible and built for cloud-to-edge applications. It establishes and tracks the servers’ trusted compute status in the data center, complies with data security regulations and provides remediation for untrusted platforms. Adding support for these key security features makes AMI TruE a reliable and easily deployed solution for data centers and cloud service providers that delivers functional computing, attestation, confidential computing and cloud execution without compromise.

    • Supply Chain Security
      • AMI FirST Builds a Platform of Trust

        The supply chain is a significant cybersecurity threat for mission-critical servers in modern data centers or enterprises. Before a device leaves the manufacturing site, it’s crucial for the original design manufacturers (ODMs), OEMs and firmware suppliers to work together to ensure the firmware is attested. At AMI, we are committed to helping maintain firmware integrity throughout the supply chain.

    • Zero Trust Firmware
      • Zero Trust Security Starts with Firmware

        Zero Trust security is essential for protecting an organization’s infrastructure and business critical data in today’s digital transformation. But without secure firmware running on the infrastructure, Zero Trust strategy weakens significantly.

        From your car to airport kiosks and power grids, nearly all technology is powered by firmware and for that reason, firmware attacks are on the rise. Firmware attacks are much more dangerous than OS-based attacks because firmware is invisible to OS-based security solutions.

        AMI’s Zero Trust firmware security solutions can help maintain firmware integrity and strengthen organizations’ Zero trust strategy.

    • Arm Solutions
      • Empower Your Arm Devices With AMI Foundational Firmware

        As an Arm license partner, one of your main objectives is to bring your designs to the market as quickly and efficiently as possible. However, this process can be fraught with challenges, and one of the biggest hurdles you may encounter is in the development of firmware. Firmware is a critical component of your device, ensuring that it powers on, runs securely, and stays on during its lifecycle. Developing firmware that meets these requirements can be a complex and time-consuming task, but it is essential for the success of your device.

  • Products
        • BIOS/UEFI
          • Aptio UEFI Firmware
          • Aptio CommunityEdition
        • Manageability
          • MegaRAC OneTree
          • MegaRAC SP-X
          • MegaRAC CommunityEdition
          • Enclosure Management - Backplane
        • Security
          • Tektagon - Platform Root of Trust
          • AMI CLEFS - Cloud-based Signing Service
          • Software Bill of Materials (SBOM)
          • Vulnerability Management (VMS)
        • Meridian Services
          • Data Center Manager (DCM)
          • Memory Resilience Technology (MRT)
          • Platform Attestation Service
  • Resources
  • Developers
        • Developer Support
          • Customer Portal
          • Support Portal
          • Technical Support
        • Tools & Utilities
          • BIOS / UEFI
          • VeB Development Environment
          • MegaRAC Development Kit
  • Company
    • About
    • Careers
    • News & Events
      • Recent Posts

        • AMI Joins Fujitsu to Deliver Next-Gen Arm-Based FUJITSU-MONAKA CPU with Unmatched Power and Efficiency October 15, 2025
        • AMI Expands Support to Open-source Ecosystem and Accelerates OpenBMC Adoption October 13, 2025
        • MegaRAC OneTree Community Edition 2.1 Achieves OCP S.A.F.E. Compliance, Reinforcing AMI Commitment to Open-source Firmware Security and Quality October 9, 2025
        • AMI Expands Open-Source Firmware Solutions in OCP Marketplace Ahead of 2025 OCP Global Summit October 8, 2025
        • AMI Achieves NVIDIA Qualified Software and System Test Suite Compliance for NVIDIA GB200 and GB300 NVL72 Exascale Computer with Aptio and MegaRAC Firmware September 8, 2025
    • Locations
    • AMI Trust Center
  • Contact Us
  • Blogs

AMI Provides Support for NVMe Metadata and End-to-End Data Protection

by | Jun 9, 2017 | AMI in the News | 0 comments

NORCROSS, GEORGIA: – AMI, a global leader in BIOS and UEFI firmware, server and remote management tools, data storage products and unique solutions based on the Linux® and Android™ operating systems, is pleased to announce the support for NVMe® metadata and end-to-end data protection in Aptio® V UEFI BIOS firmware.

The NVMe specification defines how host software interfaces with a non-volatile memory subsystem and also outlines NVMe metadata information for every block on the drive. Each block can be CRC (Cyclical Redundancy Check) protected and CRC is an integral part of the metadata.

AMI, Inc. (AMI) has added support for NVMe metadata in the Aptio V NVMe driver, providing users with the ability for end-to-end data protection. The added support allows storage of a CRC for every block in the metadata section. CRC is sometimes incorporated into the block data of storage devices to verify the data and identify corruption. While blocks are read from the drive, the Aptio V NVMe driver verifies that each block of data matches the CRC. If the data read from the block does not match the CRC, Aptio V NVMe driver will return an error for that block as “corrupted” data. As blocks are written to the drive, the CRC of the blocks is updated accordingly.

By integrating the support for NVMe metadata in the Aptio V NVMe driver, users can expect their data to be protected since data will go through a verification process, ensuring that any corrupted data is identified and fixed. Aptio V support for NVMe drive metadata exists at the pre-OS time frame and requires operating system support to be available at the OS time frame to get complete data protection.

To learn more about Aptio V UEFI Firmware from AMI, please visit ami.com/aptio.

NVMe is a registered trademark of NVM Express, Inc. in the U.S. and/or other countries. All other trademarks and registered trademarks are property of their respective owners.

SOLUTIONS

Open Source

Zero Trust Firmware

ARM Solutions

Products

Aptio

MegaRAC

Tektagon

Company

About

News & Events

AMI Security Center

colored divider

Contact

  • Follow
  • Follow
  • Follow
  • Follow
None
Solutions

Open Source
Zero Trust Firmware
ARM Solutions

Products

Aptio

MegaRAC

Tektagon

Company
About

News & Events

AMI Security Center

Contact

Contact Us Today

  • Follow
  • Follow
  • Follow
  • Follow

Copyright ©2025 AMI. All Rights Reserved. Contents of this website are subject to change without notice. Products mentioned herein may be trademarks or registered trademarks of their respective companies. No warranties are made, either expressed or implied, with regard to the contents within, its merchantability or fitness for a particular use.

Legal  |  Trademarks  |  Patents  |  Privacy Statement (EU)  |  Cookie Policy (UK)  |  Privacy Statement (UK)  |  Cookie Policy (US)  |  Privacy Statement (US)  |  Cookie Policy (EU)  |  Cookie Policy (CA)  |  Privacy Statement (CA)  |  Cookie Policy (AU)  |  Privacy Statement (AU)