Aptio® and MegaRAC® OpenEditions, Available on GitHub Today
The key to MegaRAC OpenEdition’s flexibility is a robust “common core” concept that delivers a highly-managed source base with high ROI, and a complete Service Processor Solution for wide product deployments. MegaRAC OpenEdition includes dedicated support, code patches and security advisories that all AMI customers trust and expect.
Aptio OpenEdition, with all the benefits of Aptio V, now available in open source. Firmware features support for the latest UEFI specifications and the security, fast boot and touch support that today’s platforms require.
AMI Firmware Solutions Powered by Intel® Memory Resilience Technology
AMI® Firmware Solutions boost effectiveness for Data Center Platforms with Intel® Memory Resilience Technology: Predict future memory failures in real-time and ensure data center operation and continuity
AMI firmware products have long been known for their effectiveness in the data center with powerful, reliable UEFI and BMC Management firmware for server platforms. Now, they ascend to a new level of power and productivity with the adoption of Intel Memory Resilience Technology – leveraging a multi-dimensional model and algorithms to predict future memory failures in real-time and ensure data center operation and continuity in both Aptio® V UEFI Firmware and MegaRAC® BMC Firmware from AMI.
Leveraging Intel® SGX secure enclaves, AMI TruE enables secure computing, easy to deploy workload attestation and secure application keys without compromising confidentiality – to deliver a secure data center solution that is scalable, extensible and built for cloud-to-edge applications. It establishes and tracks the servers’ trusted compute status in the data center, complies with data security regulations and provides remediation for untrusted platforms. Adding support for these key security features makes AMI TruE a reliable and easily deployed solution for data centers and cloud service providers that delivers functional computing, attestation, confidential computing and cloud execution without compromise.
Zero Trust security is essential for protecting an organization’s infrastructure and business critical data in today’s digital transformation. But without secure firmware running on the infrastructure, Zero Trust strategy weakens significantly.
From your car to airport kiosks and power grids, nearly all technology is powered by firmware and for that reason, firmware attacks are on the rise. Firmware attacks are much more dangerous than OS-based attacks because firmware is invisible to OS-based security solutions.
AMI’s Zero Trust firmware security solutions can help maintain firmware integrity and strengthen organizations’ Zero trust strategy.
In today’s “Acronym Soup” blog post, we once again step over on the manageability side of things and ask the question: What is PSME? PSME is an acronym for “Pooled System Management Engine”, which gives us a hint about its actual meaning....