References
Refer to the following resources for more details on the topics covered in this chapter:
- IBM bare-metal servers using Intel® Trusted Execution Technology (Intel TXT)— https://cloud.ibm.com/docs/bare-metal?topic=bare-metal-bm-hardware-monitroing-security-controls
- Virtual Trusted Platform Module for Shielded VMs— https://cloud.google.com/blog/products/identity-security/virtual-trusted-platform-module-for-shielded-vms-security-in-plaintext
- CyberArk endpoint protection, privilege management, and patching— https://www.cyberark.com/products/endpoint-privilege-manager
- Microsoft Defender for Endpoint—https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint
- McAfee Management for Optimized Virtual Environments AntiVirus—https://www.mcafee.com/enterprise/en-us/assets/data-sheets/ds-move-anti-virus.pdf
- Palo Alto Networks container security— https://www.paloaltonetworks...