cyber security tagged posts:

Safehouse Initiative Podcast – Conversations in the Cloud – Episode 294 – Part 3

Safehouse Initiative Podcast – Conversations in the Cloud – Episode 294 – Part 3

The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…]

Download Audio FileListen/download audio 16:46  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: , , , , , ,

Safehouse Initiative Podcast – Conversations in the Cloud – Episode 294 – Part 2

Safehouse Initiative Podcast – Conversations in the Cloud – Episode 294 – Part 2

The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…]

Download Audio FileListen/download audio 23:38  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: , , , , , ,

Safehouse Initiative Podcast – Conversations in the Cloud – Episode 294

Safehouse Initiative Podcast – Conversations in the Cloud – Episode 294

The SafeHouse Initiative was organized to provide education and awareness to businesses who are inundated with technical concepts, jargon and terms around the concepts of Business Continuity and Cyber Security. We understand that customers want to focus on their business [See the full post…]

Download Audio FileListen/download audio 13:48  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud, Security Tags: , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

September 16th, 2014 |
SIEM – Intel IT’s Security Business Intelligence Architecture

IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.

See [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,

Inside IT: Faster Threat Detection with Security Business Intelligence

September 9th, 2014 |
Inside IT: Faster Threat Detection with Security Business Intelligence

IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists [See the full post…]

Download Audio FileListen/download audio 6:08  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting. [See the full post…]

Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,