Security category posts:

IT Best Practices: Rethink Privacy

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , , ,

SAND ART: It’s your baby, Protect it!

SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both.

For more information, see: intel.com/TMI

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , ,

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intelligent Storage, Security, Technology, Transforming Storage Tags: , , , , , , ,

Meredith Corporation: Saving Time and Money with Secure, Remote Client Management

Meredith Corporation: Saving Time and Money with Secure, Remote Client Management

Business Solutions for IT Managers: The Intel vPro platform enhances remote management, user productivity, and client security for Meredith Corporation.

Share
Download Video FileWatch/download video  

Categories: Business Solutions for IT Managers, Featured, HD Video, Intel, Security, Video Podcast Tags: , , , , , , , , , ,

Meredith Corporation: Securing and Managing Remote Clients

Meredith Corporation: Securing and Managing Remote Clients

Business Solutions for IT Managers: The Intel vPro platform enhances remote management, user productivity, and client security for Meredith Corporation.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Corporate, Intel, Intel IT, IT White Papers, Security Tags: , , , , , , , , ,

Inside IT: RSA 2013

May 14th, 2013 |
Inside IT: RSA 2013

IT Best Practices: Episode 50 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this podcast we hear ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

Allied Digital: Network Security, Fewer House Calls

Allied Digital: Network Security, Fewer House Calls

Business Solutions for IT Managers: Allied Digital simplifies IT at a student health center with Intel vPro technology and LANDesk Management Suite.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , ,

CompatibleOne: Making the Cloud More Transparent

CompatibleOne: Making the Cloud More Transparent

Business Solutions for IT Managers: CompatibleOne collaborates with Intel to develop automated cloud brokerage service using Intel Trusted Execution Technology to boost confidence in the security of cloud services.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , ,

Inside IT: Evaluating Deep Defender

April 16th, 2013 |
Inside IT: Evaluating Deep Defender

IT Best Practices: Episode 48 – The evolution of threats to the security of the enterprise has driven innovation in how that enterprise defends itself. New tools need to be developed to meet today’s threat landscape. McAfee has introduced such ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Securely Connecting Smartphones and Tablets to the Enterprise

Securely Connecting Smartphones and Tablets to the Enterprise

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

McAfee Deep Defender Scores 100% in Rootkit Protection Test

McAfee Deep Defender Scores 100% in Rootkit Protection Test

IT Best Practices: McAfee Deep Defender was able to successfully block/remediate all rootkits that it detected. For McAfee, several detections took place during the installation of the rootkit, which is more difficult to deal with, but Deep Defender still managed ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , ,

Evaluating McAfee Deep Defender in the Enterprise

Evaluating McAfee Deep Defender in the Enterprise

IT Best Practices: Intel IT conducted a study of the potential security value of McAfee Deep Defender in the Enterprise. We found that this software detects, blocks and remediates stealth malware attacks in real time. Real-time detection allows IT ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

DuPont Increases Security with Intel-Based Encryption

DuPont Increases Security with Intel-Based Encryption

Business Solutions for IT Managers: IT engineers from DuPont and Intel see performance improvements of up to 300 percent in encryption and decryption.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: , , , , , , , , , , , ,

Accelerating Intel’s Growth through IT: Intel IT’s 2013 Priorities

Accelerating Intel’s Growth through IT:  Intel IT’s 2013 Priorities

IT Business Value: In this video Intel CIO, Kim Stevenson, shares her organization’s 2013 IT priorities and strategies for accelerating Intel’s growth in a time of tremendous change. Learn how Intel IT is partnering with the business to achieve Intel’s ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Big Data, Cloud Computing, Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

February 5th, 2013 |
Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Microsoft, Security Tags: , , , , , , , , , , , , , , , , , ,

eDiscovery in BYOD Environments

eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Using Data Anonymization To Enhance Cloud Security

Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

IT Best Practices: Protecting the Perimeter

IT Best Practices: Protecting the Perimeter

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

If Your Information Could Talk… Cyber-Safety in Social Media

If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at mcafee.com/advice.

Share
Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , ,