• Contact Us
  • Solutions
    • Market Segments
      • WE SUPPORT CLIENTS ACROSS INDUSTRIES

        • Cloud Service Providers
        • Telco
        • Industrial / IoT
        • Automotive
        • Enterprise
        • Edge Computing
    • Open Source
      • Aptio® and MegaRAC® OpenEditions, Available on GitHub Today

        The key to MegaRAC OpenEdition’s flexibility is a robust “common core” concept that delivers a highly-managed source base with high ROI, and a complete Service Processor Solution for wide product deployments. MegaRAC OpenEdition includes dedicated support, code patches and security advisories that all AMI customers trust and expect.

        Aptio OpenEdition, with all the benefits of Aptio V, now available in open source. Firmware features support for the latest UEFI specifications and the security, fast boot and touch support that today’s platforms require.

      • Close up of internal computer parts
    • Platform Security
      • Tektagon™ XFR Platform Firmware Resiliency

        Tektagon™ XFR is a new jointly-developed platform firmware security solution from two of the leading names in PFR – AMI and Lattice Semiconductor – to bring the industry an integrated, fully-featured, pre-verified and secure Platform Root-of-Trust solution that is flexible, scalable, low cost, and easy to implement. The solution uses the Lattice Sentry stack, featuring low-power Lattice secure control FPGAs running pre-verified, PFR-compliant IP, to implement Platform Root of Trust on a server’s motherboard. The Tektagon™ XFR firmware then orchestrates the connection between the Platform Root of Trust and other on-board components, such as SoCs and RoCs, to confirm the firmware they are running is valid.

        This solution enables developers to quickly and easily implement system-level cyber resiliency that is pre-validated as compliant with NIST Platform Firmware Resiliency (PFR) Guidelines (NIST SP 800-193), making it easy for developers with limited hardware security expertise or limited time-to-market to implement PFR on the latest industry-standard server platforms.

      • Close up of internal computer parts
    • Data Center Up-Time
      • AMI Firmware Solutions Powered by Intel® Memory Resilience Technology

        AMI® Firmware Solutions boost effectiveness for Data Center Platforms with Intel® Memory Resilience Technology: Predict future memory failures in real-time and ensure data center operation and continuity

        AMI firmware products have long been known for their effectiveness in the data center with powerful, reliable UEFI and BMC Management firmware for server platforms. Now, they ascend to a new level of power and productivity with the adoption of Intel Memory Resilience Technology – leveraging a multi-dimensional model and algorithms to predict future memory failures in real-time and ensure data center operation and continuity in both Aptio® V UEFI Firmware and MegaRAC® BMC Firmware from AMI.

      • Close up of internal computer parts
    • Confidential Computing
      • AMI TruE® enabling Confidential Computing

        Leveraging Intel® SGX secure enclaves, AMI TruE enables secure computing, easy to deploy workload attestation and secure application keys without compromising confidentiality – to deliver a secure data center solution that is scalable, extensible and built for cloud-to-edge applications. It establishes and tracks the servers’ trusted compute status in the data center, complies with data security regulations and provides remediation for untrusted platforms. Adding support for these key security features makes AMI TruE a reliable and easily deployed solution for data centers and cloud service providers that delivers functional computing, attestation, confidential computing and cloud execution without compromise.

      • Close up of internal computer parts
    • Attestation
      • AMI TruE® Trusted Environment Platform Security Solution

        With attestation from AMI TruE, you gain a trust agent running at the OS level to determine platform trust by comparing hash information to known trusted hashes. A custom installed and managed attestation server will keep all the various hashes collected across the data center and track which ones are trusted or untrusted. When a node is found to be untrusted, it can be scheduled for automatic firmware updates based upon data center policy.

      • Close up of internal computer parts
  • Products
        • Power Up
          • Aptio UEFI Firmware
          • Aptio OpenEdition
        • Stay On
          • MegaRAC BMC Management
          • MegaRAC OpenEdition
          • Embedded Management Solution
        • Run Secure
          • Tektagon - Platform Root of Trust
          • AMI TruE - Platform Attestation Service
          • AMI CLEFS - Cloud-based Signing Service
  • Resources
    • Videos & Infographics
      • At AMI, we propel innovations for compute ecosystems worldwide. Our foundational technologies ensure that the world’s systems get and stay online. We proudly offer best-in-class UEFI and remote management firmware, security solutions, development tools and utilities for top-tier manufacturers of desktop, server, mobile, and embedded/IoT systems. Find the resources you need for our products here.

      • Close up of internal computer parts
    • Data Sheets
    • Support & Other
  • Developers
        • Engineering Services
        • Developer Support
        • Security Advisories
        • Development Kits
          • Firmware for AMD CRBs
          • MegaRAC AST2600 BMC
        • Tools & Utilities
          • BIOS / UEFI
          • VeB Development Environment
          • AMIDiag for UEFI
          • AMIDebug for UEFI
  • Company
    • About
    • News & Events
      • Recent Posts

        • Matt Roesch Joins AMI Board of Directors May 17, 2022
        • AMI and Colorado State University Partnership Boosts Firmware Security Ecosystem May 10, 2022
        • Cybersecurity Executive Samuel John Cure Joins AMI as Chief Information Security Officer May 9, 2022
        • Kelly Bryant Discusses AMI, Firmware Security on Tech Talk April 26, 2022
        • AMI’s Platform Security Solution used to Verify & Secure the Integrity on the MiTAC Aowanda AD211 Edge Server April 22, 2022
    • Locations
  • Blog
  • Contact Us

AMI BLOG

Aptio and AMIBIOS in Interesting Places – Part 3

Apr 6, 2020 | Tech Blog

Computing Has Evolved – And So Has AMI!

Jan 14, 2020 | Tech Blog

Visit AMI at SC19!

Nov 19, 2019 | Tech Blog

A Guide to 5G Telco Cloud Acronyms

Sep 26, 2019 | Tech Blog

What is Visual Programming?

Sep 16, 2019 | Tech Blog

Aptio V UEFI Firmware Selected as Reference BIOS for Second Generation AMD EPYC Server Processors

Aug 16, 2019 | Tech Blog

Acronym Soup: What is UBM?

Jul 25, 2019 | Tech Blog

Aptio and AMIBIOS in Interesting Places, Part 2

Jun 11, 2019 | Tech Blog

Highlights from COMPUTEX Taipei 2019

Jun 6, 2019 | Tech Blog

AMI Introduces MegaRAC FPX2.0 NVMeoF Fabric Management Firmware

May 30, 2019 | Tech Blog

A Beginner’s Guide to PC Building Part 7

May 28, 2019 | Tech Blog

Visit AMI at COMPUTEX Taipei 2019!

May 21, 2019 | Tech Blog

« Older Entries
Next Entries »

SOLUTIONS

Open Source

Platform Security

Products

Power Up

Stay On

Run Secure

Company

About

News & Events

Locations

colored divider

Contact

  • Follow
  • Follow
  • Follow
  • Follow
AMI_PRAMI@AMI_PR·
19 May

#Cybersecurity threats are on the rise… but AMI CLEFS is designed to deliver secure, reliable and simple cloud-based signing services to protect your firmware and keys from attacks. Learn more: https://bit.ly/3EoxBwk

Reply on Twitter 1527291736401141760Retweet on Twitter 1527291736401141760Like on Twitter 15272917364011417602Twitter 1527291736401141760
Load More...
None
Solutions

Initiatives

Products

Power Up

Stay On

Run Secure

Company

About

News & Events

Locations

Contact

Contact Us Today

  • Follow
  • Follow
  • Follow
  • Follow
AMI_PRAMI@AMI_PR·
19 May

#Cybersecurity threats are on the rise… but AMI CLEFS is designed to deliver secure, reliable and simple cloud-based signing services to protect your firmware and keys from attacks. Learn more: https://bit.ly/3EoxBwk

Reply on Twitter 1527291736401141760Retweet on Twitter 1527291736401141760Like on Twitter 15272917364011417602Twitter 1527291736401141760
Load More...

Copyright ©2022 AMI. All Rights Reserved. Contents of this website are subject to change without notice. Products mentioned herein may be trademarks or registered trademarks of their respective companies. No warranties are made, either expressed or implied, with regard to the contents within, its merchantability or fitness for a particular use.

Legal  |  Trademarks  |  Patents  |  Privacy Statement (EU)  |  Cookie Policy (UK)  |  Privacy Statement (UK)  |  Cookie Policy (US)  |  Privacy Statement (US)  |  Cookie Policy (EU)  |  Cookie Policy (CA)  |  Privacy Statement (CA)  |  Cookie Policy (AU)  |  Privacy Statement (AU)