BitDefender testing of encryption software on Intel Core i5 processors

June 2010 Information Security

Testing program demonstrates how BitDefender software can take advantage of the most advanced Intel hardware and create a better computing experience for users.

BitDefender engineers have completed an exhaustive test program designed to measure software performance on Intel's latest notebook platform based on Intel Core i5 mobile processor. BitDefender software was optimised to maximise performance on the Intel latest processors. By taking advantage of a specialised set of instructions available with the Intel's latest notebook platform based on Intel Core i5 mobile processor, BitDefender’s File Vault demonstrated more than double throughput performance for tasks involving file encryption on a local drive.

BitDefender’s File Vault allows users to create encrypted, password-protected logical drives (or vaults) on their computer to securely store confidential and sensitive documents. These types of processes move massive amounts of data through users’ systems and can be time consuming and resource intensive. Benchmarking tests which BitDefender conducted jointly with Intel software application engineers measured performance of File Vault’s copy and encryption operations in read and write modes.

The tests showed impressive performance gains through the use of Intel's new Advanced Encryption Standard (AES) Instructions (AES-NI). The AES-NI standard includes a specialised set of instructions for cryptography. BitDefender developers added a custom set of software code optimised for AES-NI instructions to the tested revision of File Vault module. On the test systems equipped with Intel SATA solid-state drives the benchmarks demonstrated significant increase in throughput from 44 Mb/s to 103 Mb/s - a 134% speed-up for both reading and writing operations.

Having proven how it can improve performance through using Intel's new Advanced AES-NI Instructions, BitDefender will integrate the optimised instructions in the future updates of their software products to enable its customers can take advantage of the performance increase.

"As a result of testing, we are moving forward with releasing software updates so that all our customers can take full advantage of the newest hardware from Intel,” said Alexandru Balan, BitDefender product manager for Technology and Innovation. “In particular, the benefits to the speed of encryption will add convenience and ease of use for all the users of BitDefender File Vault employing the latest technologies from Intel."

“We are excited to see how software companies like BitDefender working together with Intel application engineers can take advantage of the new AES-NI instructions implemented in Intel's latest notebook platform based on Intel Core i5 mobile processor to the direct benefit of end users,” said Wolfgang Petersen, EMEA director of Intel Software & Services Group.

For more information contact Alina Anton, senior PR and marketing coordinator, EMEA &APAC Business Unit, BitDefender, +40 212 063 470, [email protected], www.bitdefender.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...