Security channel:

eDiscovery in BYOD Environments

January 22nd, 2013 |
eDiscovery in BYOD Environments

IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Using Data Anonymization To Enhance Cloud Security

January 21st, 2013 |
Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |

If Your Information Could Talk… Cyber-Safety in Social Media

December 20th, 2012 |
If Your Information Could Talk… Cyber-Safety in Social Media

IT Best Practices: Find out what happens when Carl carelessly shares his sensitive information on “Friend Party”. Intel and McAfee partner to show how trusting strangers can turn something fun and useful into a huge problem. Learn more at [See the full post…]

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: , , , , , , , ,

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

December 9th, 2012 |

Lafarge: Intuitive and Secure Computing for Business

December 2nd, 2012 |

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

November 27th, 2012 |

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting. [See the full post…]

Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,

Aria Systems: Providing the Foundation for an Expanding Cloud

September 20th, 2012 |
Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing [See the full post…]

Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HPE - Hewlett Packard Enterprise, Intel, IT White Papers, Security Tags: , , , , , , , , , , , , , , , , ,

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

September 7th, 2012 |

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

September 6th, 2012 |

Air Products: Efficiently Managing a Global Fleet of PCs

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security, Technology Tags: , , , , , , ,

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

WSH: Holding Risk at Bay

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

If the growing IT complexity in many enterprises helps to foster employee creativity, collaboration and productivity, then security pros want to enable and not limit the diversity of apps, platforms and hardware. That’s the message from McAfee’s Tyler Carter at [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Security, Tech Conferences and Events, Technology Tags: , , , , , , , ,

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Inertia: On the Floor of the 2012 RSA Security Conference

March 2nd, 2012 |
Inertia: On the Floor of the 2012 RSA Security Conference

IT Security: Defending against intrusion was a hot topic at previous RSA conferences. But users are using their devices outside the network perimeter of their organizations, which exposes data like never before. In this podcast we asked several security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Editorial, Inertia: Technology News and Opinion, Security, Tech Conferences and Events Tags: , , , , , , , , , , , , , , , , , , , , ,

Improving Security and Mobility for Personally Owned Devices

February 24th, 2012 |
Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.

To support this initiative, we have [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

January 30th, 2012 |
IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.
  [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

IT Best Practices: Rethinking Information Security to Improve Business Agility

December 7th, 2011 |
IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT@Intel Technology Tip: The 12 Scams of Christmas

November 18th, 2011 |
IT@Intel Technology Tip: The 12 Scams of Christmas

IT Best Practices: As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,