Cloud Security Architecture tagged posts:

IT Best Practices: Overcoming Security Challenges to Virtualize Internet-Facing Applications

November 22nd, 2011 |
IT Best Practices: Overcoming Security Challenges to Virtualize Internet-Facing Applications

IT Best Practices: The purpose of this paper is to describe how Intel IT neutralized security risks that have allowed us to enable virtualization for the DMZ and SIZ thereby allowing Intel IT to expand the benefits of virtualization. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , ,

IT Best Practices: Overcoming Security Challenges to Virtualize Internet-facing Applications

November 17th, 2011 |
IT Best Practices: Overcoming Security Challenges to Virtualize Internet-facing Applications

IT Best Practices: The purpose of this paper is to describe how Intel IT neutralized security risks that have allowed us to enable virtualization for the DMZ and SIZ thereby allowing Intel IT to expand the benefits of virtualization. [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, virtualization Tags: , , , , , , , , ,