Security category posts:

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

Business Solutions for IT Managers: Air Force Research Laboratory (AFRL) teams with Intel and Citrix to increase client security while saving millions of dollars annually.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , , ,

Lafarge: Intuitive and Secure Computing for Business

Lafarge: Intuitive and Secure Computing for Business

Business Solutions for IT Managers: Lafarge tests highlight the potential for touch-enabled Ultrabook devices to deliver trusted, efficient access to information within the enterprise.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , ,

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

Business Solutions for IT Managers: Swiss Mobiliar: Intel Core i7 processors offer improved performance, connectivity, security and lighter devices.

Share
Download PDFRead/Download PDF  

Categories: Big Data, Business Solutions for IT Managers, Cloud Computing, Corporate, data centers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Share
Download Video FileWatch/download video  

Categories: Big Data, Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,

Aria Systems: Providing the Foundation for an Expanding Cloud

Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HP - Technology For Better Business Outcomes, Intel, IT White Papers, Security Tags: , , , , , , , , , , , , , , , ,

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Robert Rounsavall and Jose Gonzalez from Trapezoid discuss the company’s products – Trapezoid Data Intelligence – in the areas of hardware trust and security that allow moving into ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, data centers, Intel, Intel Conversations in the Cloud, Security, Technology Tags: , , , , , , , , , , , , ,

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

Business Solutions for IT Managers: With Intel Core vPro processors, Netown Corporation can provide high-quality telehealth services that offer efficiency, security, and quick response for its elderly and chronic disease patients.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Intel, IT White Papers, Security Tags: , , , , , , , , , , ,

Air Products: Efficiently Managing a Global Fleet of PCs

Air Products: Efficiently Managing a Global Fleet of PCs

Business Solutions for IT Managers: Air Products refreshes client systems with Intel Core vPro processors to improve remote management, tighten security, and deliver outstanding performance.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security, Technology Tags: , , , , , , ,

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

WSH: Holding Risk at Bay

WSH: Holding Risk at Bay

Business Solutions for IT Managers: Hungarian system integrator WSH offers customers protection against laptop loss and theft with security software from Symantec and Intel Anti-Theft Technology.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Corporate, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , , ,

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Tim Roddy, Sr. Director Product Marketing from McAfee, chats about some of the biggest security concerns when moving data and applications to the cloud including malware, compliance issues, ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Intel, Intel Conversations in the Cloud, Security Tags: , , , , , , , , , , ,

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

If the growing IT complexity in many enterprises helps to foster employee creativity, collaboration and productivity, then security pros want to enable and not limit the diversity of apps, platforms and hardware. That’s the message from McAfee’s Tyler Carter at ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Security, Tech Conferences and Events, Technology Tags: , , , , , , , ,

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Inertia: On the Floor of the 2012 RSA Security Conference

March 2nd, 2012 |
Inertia: On the Floor of the 2012 RSA Security Conference

IT Security: Defending against intrusion was a hot topic at previous RSA conferences. But users are using their devices outside the network perimeter of their organizations, which exposes data like never before. In this podcast we asked several security experts ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Editorial, Inertia: Technology News and Opinion, Security, Tech Conferences and Events Tags: , , , , , , , , , , , , , , , , , , , ,

Improving Security and Mobility for Personally Owned Devices

Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.

To support this initiative, we have developed ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.  

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture.

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,