The INTEL® XEON® PROCESSOR E5620 processor, with advanced features like ECC memory supporting and Virtualization Technology, is built to handle the ever-changing demands of a virtualized and consolidated computing environment.
Important Warranty Information
This product is end-of-sale and no longer warranted by the manufacturer. Instead, Newegg warranties this product for one year from date of purchase. If you require warranty service after thirty days, please contact Newegg Customer Service, not the manufacturer.
ECC MEMORY SUPPORT
With the integrated DDR3 memory controller, the INTEL® XEON® PROCESSOR E5620 processor enables three channels of ECC DDR3 memory, resulting in up to 25.6 GB/sec memory bandwidth.
INTEL VIRTUALIZATION TECHNOLOGY (VT-X)
Increasing manageability, security, and flexibility in IT environments, virtualization technologies like hardware-assisted Intel Virtualization Technology (Intel VT) combined with software-based virtualization solutions provide maximum system utilization by consolidating multiple environments into a single server or PC. By abstracting the software away from the underlying hardware, a world of new usage models opens up that reduce costs, increase management efficiency, strengthen security, while making your computing infrastructure more resilient in the event of a disaster.
INTEL TRUSTED EXECUTION TECHNOLOGY
Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution.INTEL® XEON® PROCESSOR E5620 Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks and protects the confidentiality and integrity of data stored or created on the client PC. It does this by enabling an environment where applications can run within their own space, protected from all other software on the system. These capabilities provide the protection mechanisms, rooted in hardware, that are necessary to provide trust in the application’s execution environment. In turn, this can help to protect vital data and processes from being compromised by malicious software running on the platform.