Security category posts:

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Software Defined Networking with the Intel Atom Processor C2000 – Intel Chip Chat – Episode 266

Software Defined Networking with the Intel Atom Processor C2000 – Intel Chip Chat – Episode 266

In this Intel Chip Chat audio podcast with Allyson Klein: Oliver Chen, Product Marketing Manager for American Portwell Technology, chats about the company’s new CAD-0230 network communication security appliance based on the Intel Atom C2000 processor. This system allows for ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , , , , , ,

IT Best Practices: Rethink Privacy

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , , ,

SAND ART: It’s your baby, Protect it!

SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both.

For more information, see: intel.com/TMI

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , ,

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: , , , , , , ,

Meredith Corporation: Saving Time and Money with Secure, Remote Client Management

Meredith Corporation: Saving Time and Money with Secure, Remote Client Management

Business Solutions for IT Managers: The Intel vPro platform enhances remote management, user productivity, and client security for Meredith Corporation.

Share
Download Video FileWatch/download video  

Categories: Business Solutions for IT Managers, HD Video, Intel, Security, Video Podcast Tags: , , , , , , , , , ,

Meredith Corporation: Securing and Managing Remote Clients

Meredith Corporation: Securing and Managing Remote Clients

Business Solutions for IT Managers: The Intel vPro platform enhances remote management, user productivity, and client security for Meredith Corporation.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Corporate, Intel, Intel IT, IT White Papers, Security Tags: , , , , , , , , ,

Inside IT: RSA 2013

May 14th, 2013 |
Inside IT: RSA 2013

IT Best Practices: Episode 50 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this podcast we hear ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

Allied Digital: Network Security, Fewer House Calls

Allied Digital: Network Security, Fewer House Calls

Business Solutions for IT Managers: Allied Digital simplifies IT at a student health center with Intel vPro technology and LANDesk Management Suite.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , ,

CompatibleOne: Making the Cloud More Transparent

CompatibleOne: Making the Cloud More Transparent

Business Solutions for IT Managers: CompatibleOne collaborates with Intel to develop automated cloud brokerage service using Intel Trusted Execution Technology to boost confidence in the security of cloud services.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , ,

Securely Connecting Smartphones and Tablets to the Enterprise

Securely Connecting Smartphones and Tablets to the Enterprise

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

DuPont Increases Security with Intel-Based Encryption

DuPont Increases Security with Intel-Based Encryption

Business Solutions for IT Managers: IT engineers from DuPont and Intel see performance improvements of up to 300 percent in encryption and decryption.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: , , , , , , , , , , , ,

Accelerating Intel’s Growth through IT: Intel IT’s 2013 Priorities

Accelerating Intel’s Growth through IT:  Intel IT’s 2013 Priorities

IT Business Value: In this video Intel CIO, Kim Stevenson, shares her organization’s 2013 IT priorities and strategies for accelerating Intel’s growth in a time of tremendous change. Learn how Intel IT is partnering with the business to achieve Intel’s ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Big Data, Cloud Computing, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

February 5th, 2013 |
Inside IT: Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

IT Best Practices: Episode 43 – There’s a revolution going on in workplace computing at Intel. In previous podcasts we’ve talked about the introduction of new, portable platforms, the bring-your-own-device program, and the deployment of Windows 8 throughout the ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Microsoft, Security Tags: , , , , , , , , , , , , , , , , , ,

eDiscovery in BYOD Environments

eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents productivity ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Using Data Anonymization To Enhance Cloud Security

Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

IT Best Practices: Protecting the Perimeter

IT Best Practices: Protecting the Perimeter

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins

At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

If Your Information Could Talk… Cyber-Safety in Social Media

If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at mcafee.com/advice.

Share
Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , ,

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

Business Solutions for IT Managers: Air Force Research Laboratory (AFRL) teams with Intel and Citrix to increase client security while saving millions of dollars annually.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , , ,

Lafarge: Intuitive and Secure Computing for Business

Lafarge: Intuitive and Secure Computing for Business

Business Solutions for IT Managers: Lafarge tests highlight the potential for touch-enabled Ultrabook devices to deliver trusted, efficient access to information within the enterprise.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , ,

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

Business Solutions for IT Managers: Swiss Mobiliar: Intel Core i7 processors offer improved performance, connectivity, security and lighter devices.

Share
Download PDFRead/Download PDF  

Categories: Big Data, Business Solutions for IT Managers, Cloud Computing, Corporate, data centers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Share
Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,

Aria Systems: Providing the Foundation for an Expanding Cloud

Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HP - Technology For Better Business Outcomes, Intel, IT White Papers, Security Tags: , , , , , , , , , , , , , , , ,