BitDefender testing of encryption software on Intel Core i5 processors

June 2010 Cyber Security

Testing program demonstrates how BitDefender software can take advantage of the most advanced Intel hardware and create a better computing experience for users.

BitDefender engineers have completed an exhaustive test program designed to measure software performance on Intel's latest notebook platform based on Intel Core i5 mobile processor. BitDefender software was optimised to maximise performance on the Intel latest processors. By taking advantage of a specialised set of instructions available with the Intel's latest notebook platform based on Intel Core i5 mobile processor, BitDefender’s File Vault demonstrated more than double throughput performance for tasks involving file encryption on a local drive.

BitDefender’s File Vault allows users to create encrypted, password-protected logical drives (or vaults) on their computer to securely store confidential and sensitive documents. These types of processes move massive amounts of data through users’ systems and can be time consuming and resource intensive. Benchmarking tests which BitDefender conducted jointly with Intel software application engineers measured performance of File Vault’s copy and encryption operations in read and write modes.

The tests showed impressive performance gains through the use of Intel's new Advanced Encryption Standard (AES) Instructions (AES-NI). The AES-NI standard includes a specialised set of instructions for cryptography. BitDefender developers added a custom set of software code optimised for AES-NI instructions to the tested revision of File Vault module. On the test systems equipped with Intel SATA solid-state drives the benchmarks demonstrated significant increase in throughput from 44 Mb/s to 103 Mb/s - a 134% speed-up for both reading and writing operations.

Having proven how it can improve performance through using Intel's new Advanced AES-NI Instructions, BitDefender will integrate the optimised instructions in the future updates of their software products to enable its customers can take advantage of the performance increase.

"As a result of testing, we are moving forward with releasing software updates so that all our customers can take full advantage of the newest hardware from Intel,” said Alexandru Balan, BitDefender product manager for Technology and Innovation. “In particular, the benefits to the speed of encryption will add convenience and ease of use for all the users of BitDefender File Vault employing the latest technologies from Intel."

“We are excited to see how software companies like BitDefender working together with Intel application engineers can take advantage of the new AES-NI instructions implemented in Intel's latest notebook platform based on Intel Core i5 mobile processor to the direct benefit of end users,” said Wolfgang Petersen, EMEA director of Intel Software & Services Group.

For more information contact Alina Anton, senior PR and marketing coordinator, EMEA &APAC Business Unit, BitDefender, +40 212 063 470,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber attackers used over 500 tools and tactics in 2022
Cyber Security News
The most common root causes of attacks were unpatched vulnerabilities and compromised credentials, while ransomware continues to be the most common ‘end game’ and attacker dwell time is shrinking – for better or worse.

Addressing the SCADA in the room
Industrial (Industry) Cyber Security
Few other sectors command the breadth of purpose-built and custom devices necessary to function, as the industrial and manufacturing industries. These unique devices create an uncommon risk that must be assessed and understood to fully protect against incoming attacks.

Recession or stress?
Cyber Security News
The economic landscape has seen many technology companies lay off vast numbers of employees, but for cybersecurity, the picture looks very different – a dynamic mixture of excitement, challenges and toxicity.

Vulnerabilities in industrial cellular routers’ cloud management platforms
Industrial (Industry) Cyber Security Security Services & Risk Management
Research from OTORIO, a provider of operational technology cyber and digital risk management solutions, unveils cyber risks in M2M protocols and asset registration that expose hundreds of thousands of devices and OT networks to attack

NEC XON appoints Armand Kruger as Head of Cybersecurity
News Cyber Security
NEC XON has announced the appointment of Armand Kruger as the Head of Cybersecurity. Kruger will oversee all cybersecurity offerings including cybersecurity strategy, programmes, and executive advisory.

Caesar Tonkin new head of cybersecurity business, Armata
News Cyber Security
Vivica Holdings has announced the appointment of cybersecurity expert Caesar Tonkin to head up its cybersecurity business Armata, which provides technology solutions and niche expertise needed to help businesses better protect themselves.

Surveillance-free surfing
News Cyber Security Products
Zoho has launched Ulaa, a privacy-centric browser built specifically to help users secure their personal data and activity by providing a browser solution that universally blocks tracking and website surveillance.

Troye and Arctic Wolf join forces
News Cyber Security Security Services & Risk Management
Troye has announced a strategic partnership with Arctic Wolf to enable Troye to provide customers with enhanced cybersecurity solutions and services that help protect their businesses from advanced cyber threats.

Relaxed home cybersecurity could render consumers accidental ‘inside actors’
Editor's Choice Cyber Security Smart Home Automation
Cisco security experts warn of snowball impact of relaxed approach to cybersecurity on personal devices, noting 60% of users primarily use their personal phone for work tasks and 76% have used unsecured public networks for work tasks.

VMware unveils new security capabilities
Cyber Security IT infrastructure Products
At the RSA Conference 2023, VMware unveiled enhanced features for its suite of security solutions to address the increasing sophistication and scale of cyberattacks and to deliver strong lateral security across multi-cloud environments.