Security category posts:

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Software Defined Networking with the Intel Atom Processor C2000 – Intel Chip Chat – Episode 266

Software Defined Networking with the Intel Atom Processor C2000 – Intel Chip Chat – Episode 266

In this Intel Chip Chat audio podcast with Allyson Klein: Oliver Chen, Product Marketing Manager for American Portwell Technology, chats about the company’s new CAD-0230 network communication security appliance based on the Intel Atom C2000 processor. This system allows for ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , , , , , ,

IT Best Practices: Rethink Privacy

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , , ,

SAND ART: It’s your baby, Protect it!

SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both.

For more information, see: intel.com/TMI

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , ,

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intelligent Storage, Security, Technology, Transforming Storage Tags: , , , , , , ,

Meredith Corporation: Saving Time and Money with Secure, Remote Client Management

Meredith Corporation: Saving Time and Money with Secure, Remote Client Management

Business Solutions for IT Managers: The Intel vPro platform enhances remote management, user productivity, and client security for Meredith Corporation.

Share
Download Video FileWatch/download video  

Categories: Business Solutions for IT Managers, HD Video, Intel, Security, Video Podcast Tags: , , , , , , , , , ,

Meredith Corporation: Securing and Managing Remote Clients

Meredith Corporation: Securing and Managing Remote Clients

Business Solutions for IT Managers: The Intel vPro platform enhances remote management, user productivity, and client security for Meredith Corporation.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Corporate, Intel, Intel IT, IT White Papers, Security Tags: , , , , , , , , ,

Inside IT: RSA 2013

May 14th, 2013 |
Inside IT: RSA 2013

IT Best Practices: Episode 50 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this podcast we hear ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

Allied Digital: Network Security, Fewer House Calls

Allied Digital: Network Security, Fewer House Calls

Business Solutions for IT Managers: Allied Digital simplifies IT at a student health center with Intel vPro technology and LANDesk Management Suite.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , ,

CompatibleOne: Making the Cloud More Transparent

CompatibleOne: Making the Cloud More Transparent

Business Solutions for IT Managers: CompatibleOne collaborates with Intel to develop automated cloud brokerage service using Intel Trusted Execution Technology to boost confidence in the security of cloud services.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , ,

Inside IT: Evaluating Deep Defender

April 16th, 2013 |
Inside IT: Evaluating Deep Defender

IT Best Practices: Episode 48 – The evolution of threats to the security of the enterprise has driven innovation in how that enterprise defends itself. New tools need to be developed to meet today’s threat landscape. McAfee has introduced such ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Securely Connecting Smartphones and Tablets to the Enterprise

Securely Connecting Smartphones and Tablets to the Enterprise

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

McAfee Deep Defender Scores 100% in Rootkit Protection Test

McAfee Deep Defender Scores 100% in Rootkit Protection Test

IT Best Practices: McAfee Deep Defender was able to successfully block/remediate all rootkits that it detected. For McAfee, several detections took place during the installation of the rootkit, which is more difficult to deal with, but Deep Defender still managed ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , ,

Evaluating McAfee Deep Defender in the Enterprise

Evaluating McAfee Deep Defender in the Enterprise

IT Best Practices: Intel IT conducted a study of the potential security value of McAfee Deep Defender in the Enterprise. We found that this software detects, blocks and remediates stealth malware attacks in real time. Real-time detection allows IT ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

DuPont Increases Security with Intel-Based Encryption

DuPont Increases Security with Intel-Based Encryption

Business Solutions for IT Managers: IT engineers from DuPont and Intel see performance improvements of up to 300 percent in encryption and decryption.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: , , , , , , , , , , , ,

Accelerating Intel’s Growth through IT: Intel IT’s 2013 Priorities

Accelerating Intel’s Growth through IT:  Intel IT’s 2013 Priorities

IT Business Value: In this video Intel CIO, Kim Stevenson, shares her organization’s 2013 IT priorities and strategies for accelerating Intel’s growth in a time of tremendous change. Learn how Intel IT is partnering with the business to achieve Intel’s ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Big Data, Cloud Computing, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

February 5th, 2013 |
Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Microsoft, Security Tags: , , , , , , , , , , , , , , , , , ,

eDiscovery in BYOD Environments

eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,