Specification Sheet
Intel
®
Xeon
®
Processor E5-2600 v4 Product Family 2
• Higher performance for multi-threaded workloads.
Intel® Transactional Synchronization Extensions
(Intel® TSX) exposes hidden parallelism to help boost
performance for online transaction processing (OLTP)
and other multi-threaded workloads that are currently
slowed by memory locking.
• Higher performance for mixed workloads. Intel® Advanced
Vector Extensions 2.0 doubles the number of oating point
operations (ops) per clock cycle versus rst generation
Intel® AVX. New optimizations in the Intel Xeon processor
E5-2600 v4 product family enable higher core frequencies
for concurrent applications that don’t use Intel AVX2, which
helps to optimize overall performance for mixed workloads.
• Faster access to critical data. Enhanced Intel® Data
Directed I/O allows direct data transfers to last level cache
(LLC) with optimized LLC-to-core communications. Main
memory is bypassed completely to provide high-speed,
low-latency data access that is ideal for today’s increasingly
data-hungry applications.
• Enhanced virtualization. Intel® Virtual Machine Control
Structure (VMCS) shadowing extends root virtual machine
monitor (VMM)-like privileges to a guest VMM to provide
more exible support for legacy code and deep security
monitoring. Additional virtualization enhancements in the
Intel Xeon processor E5-2600 v4 product family enable
fewer and faster transitions to the VMM through Posted
Interrupts and other innovations, so more compute cycles
can be devoted to virtual machine performance. Support
for Page Modication Logging has also been added to
enable high-end availability for virtual machines while
reducing performance overhead.
Smarter Orchestration Through
Built-In Instrumentation
With the growth of private and hybrid clouds in the
enterprise, IT organizations are deploying powerful new
tools for orchestrating and automating data center resource
management. The Intel Xeon processor E5-2600 v4 product
family includes Intel® Resource Director Technology, which
provides deeper visibility and control over shared platform
resources to enable smarter orchestration. This suite of
technologies, which will continue to evolve in the future,
can help IT organizations improve service levels and
infrastructure utilization and accelerate their move toward
fully-automated SDI.
• Cache Monitoring and Allocation Technologies (CMT &
CAT). The ability to monitor and allocate LLC usage for
individual applications and virtual machines can help IT
provide more reliable performance guarantees for high
priority applications and make better decisions regarding
workload placement, load balancing, and consolidation
ratios. The data can also be used to deliver tiered services
with metered charge back.
• Memory Bandwidth Monitoring (MBM). With granular
visibility into memory bandwidth usage, IT can balance
workloads across sockets to avoid contention, improve
utilization, and deliver higher service levels.
• Code and Data Prioritization (CDP). Code and data
placement in the LLC can now be programmatically
controlled to help optimize performance and code isolation
for applications that have large code footprints or high
sensitivity to code residency in the last-level cache.
• End-to-end power management. Intel® Node Manager 3.0
oers real-time telemetry data on server power, thermal,
and utilization levels, so IT can implement policies for
enhanced orchestration, improved data center eciency,
and more ecient power utilization.
A Better Foundation for Trust and Security
The volume and sophistication of digital threats continue to
escalate. The Intel Xeon Processor E5-2600 v4 product
family adds additional layers of hardware-assisted security
to help protect data and platforms more eectively through
enhanced workload isolation, improved security policy
enforcement, and faster cryptography.
• Up to 70 percent increased per-core performance on key
encryption algorithms.
5
New instructions (such as ADCX/
ADOX and PCLMULQDQ micro-architecture) in the Intel
Xeon processor E5-2600 v4 product family help to acceler-
ate secure session initiation protocols based on RSA, ECC,
and Secure Hash Algorithm (SHA). Intel® Data Protection
Technology with Intel® Advanced Encryption Standard New
Instructions (Intel® AES-NI) has also been improved to
enable even faster bulk data encryption. With these
technologies, protecting data at rest and during transmis-
sion is practically transparent for many workloads.
• Enhanced Key Security. The Intel Xeon processor E5-2600
v4 family provides an integrated random number generator
for creating security keys and a random bit generator for
seeding software-based solutions. Both technologies help
to provide high quality keys for enhanced security.
• Strong protection against platform attacks. Intel® Plat-
form Protection Technology with OS Guard (Supervisor
Mode Execution Protection) has been enhanced with new
Supervisor Mode Access Prevention (SMAP). These tech-
nologies work together to prevent privileged code in the
operating system from executing or even accessing data