Security category posts:

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

November 27th, 2012 |
Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

Business Solutions for IT Managers: Swiss Mobiliar: Intel Core i7 processors offer improved performance, connectivity, security and lighter devices.

Share
Download PDFRead/Download PDF  

Categories: Corporate, Intel, Security, IT White Papers, Cloud Computing, data centers, Information Technology, Business Solutions for IT Managers, Big Data Tags: , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Share
Download Video FileWatch/download video  

Categories: Corporate, Intel, IT@Intel, Security, Technology, Intel IT, HD Video, Information Technology, Big Data Tags: , , , , , , , , , ,

Aria Systems: Providing the Foundation for an Expanding Cloud

September 20th, 2012 |
Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: HP - Technology For Better Business Outcomes, Intel, Security, IT White Papers, Cloud Computing, data centers, Business Solutions for IT Managers Tags: , , , , , , , , , , , , , , , ,

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

September 7th, 2012 |
Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Robert Rounsavall and Jose Gonzalez from Trapezoid discuss the company’s products – Trapezoid Data Intelligence – in the areas of hardware trust and security that allow moving into ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, Security, Technology, Cloud Computing, data centers, Audio Podcast, Intel Conversations in the Cloud Tags: , , , , , , , , , , , , ,

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

September 6th, 2012 |
Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

Business Solutions for IT Managers: With Intel Core vPro processors, Netown Corporation can provide high-quality telehealth services that offer efficiency, security, and quick response for its elderly and chronic disease patients.

Share
Download PDFRead/Download PDF  

Categories: Intel, Security, IT White Papers, Business Solutions for IT Managers, Healthcare Tags: , , , , , , , , , , , ,

Air Products: Efficiently Managing a Global Fleet of PCs

Air Products: Efficiently Managing a Global Fleet of PCs

Business Solutions for IT Managers: Air Products refreshes client systems with Intel Core vPro processors to improve remote management, tighten security, and deliver outstanding performance.

Share
Download PDFRead/Download PDF  

Categories: Intel, Security, IT White Papers, Information Technology, Business Solutions for IT Managers Tags: , , , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, IT@Intel, Security, Intel IT, IT White Papers, Cloud Computing, Information Technology Tags: , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Intel, IT@Intel, Security, Technology, Intel IT, IT White Papers, Cloud Computing, Information Technology Tags: , , , , , , ,

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, Intel vPro, IT@Intel, Security, Intel IT, IT White Papers, Information Technology Tags: , , , , , , , ,

WSH: Holding Risk at Bay

WSH: Holding Risk at Bay

Business Solutions for IT Managers: Hungarian system integrator WSH offers customers protection against laptop loss and theft with security software from Symantec and Intel Anti-Theft Technology.

Share
Download PDFRead/Download PDF  

Categories: Corporate, Intel, Security, IT White Papers, Information Technology, Business Solutions for IT Managers Tags: , , , , , , , , , , ,

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Tim Roddy, Sr. Director Product Marketing from McAfee, chats about some of the biggest security concerns when moving data and applications to the cloud including malware, compliance issues, ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, Security, Audio Podcast, Intel Conversations in the Cloud, Big Data Tags: , , , , , , , , , , ,

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

If the growing IT complexity in many enterprises helps to foster employee creativity, collaboration and productivity, then security pros want to enable and not limit the diversity of apps, platforms and hardware. That’s the message from McAfee’s Tyler Carter at ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Tech Conferences and Events, Security, Technology, data centers, Audio Podcast Tags: , , , , , , , ,

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, IT@Intel, Security, Intel IT, Audio Podcast, Inside IT Tags: , , , , , , , , , , , , , , ,

Inertia: On the Floor of the 2012 RSA Security Conference

March 2nd, 2012 |
Inertia: On the Floor of the 2012 RSA Security Conference

IT Security: Defending against intrusion was a hot topic at previous RSA conferences. But users are using their devices outside the network perimeter of their organizations, which exposes data like never before. In this podcast we asked several security experts ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Tech Conferences and Events, Security, Audio Podcast, Inertia: Technology News and Opinion, Editorial, Big Data Tags: , , , , , , , , , , , , , , , , , , , ,

Improving Security and Mobility for Personally Owned Devices

February 24th, 2012 |
Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.

To support this initiative, we have developed ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: IT@Intel, Security, Intel IT, IT White Papers Tags: , , , , , , , , , ,

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

January 30th, 2012 |
IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.  

Share
Download PDFRead/Download PDF  

Categories: Intel, IT@Intel, Security, Intel IT, IT White Papers, Information Technology Tags: , , , , , , , , , , , , ,

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, IT@Intel, Security, Intel IT, Audio Podcast, Inside IT, Information Technology Tags: , , , , , , , , , ,

IT Best Practices: Rethinking Information Security to Improve Business Agility

December 7th, 2011 |
IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture.

Share
Download PDFRead/Download PDF  

Categories: Intel, IT@Intel, Security, Intel IT, IT White Papers, Information Technology Tags: , , , , , , , , , , , , , , , ,

IT@Intel Technology Tip: The 12 Scams of Christmas

November 18th, 2011 |
IT@Intel Technology Tip:  The 12 Scams of Christmas

IT Best Practices: As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. In ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, IT@Intel, Security, Intel IT, IT White Papers, Information Technology Tags: , , , , , , , , , , , ,

The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

September 26th, 2011 |
The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

In this VMworld podcast, Stu Miniman from Wikibon drops by to talk about his organization and cloud computing adoption today and in the future. Topics include simplifying the cloud, manageability, regulation, and security.

See also: Intel Conversations in the Cloud

Share
Download Audio FileListen/download audio  

Categories: Security, VMware, Cloud Computing, Audio Podcast, Intel Conversations in the Cloud Tags: , , , , , , , , , , , , ,

Inside IT: Disaster Preparedness for the Data Center

September 20th, 2011 |
Inside IT: Disaster Preparedness for the Data Center

IT Best Practices: Episode 8 – With the ten-year anniversary of 9-11, we’re reminded of the importance of being prepared for disaster and how that day changed the way many IT professionals view data security. With Texas fires and Hurricane ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, IT@Intel, Security, Intel IT, Audio Podcast, Inside IT, Information Technology Tags: , , , , , , , , , , , , ,

Inside IT: Cloud Computing & Security

August 9th, 2011 |
Inside IT: Cloud Computing & Security

IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, IT@Intel, Security, Intel IT, Cloud Computing, Audio Podcast, Inside IT Tags: , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to mitigate ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, IT@Intel, Security, Intel IT, IT White Papers, Information Technology Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual effort ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, IT@Intel, Security, Intel IT, IT White Papers, Information Technology Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

The Tomorrow Project: Computer Security

The Tomorrow Project: Computer Security

In this episode of The Tomorrow Project: Brian David Johnson, Futurist at Intel Corporation, interviews Tadayoshi Kohno about embedded computational devices and security.

Kohno, a scientist and researcher at the University of Washington, studies how everyday devices around us such ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Intel, Security, HD Video, Video Podcast, The Tomorrow Project Tags: , , , , , , , , , , ,