Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security, virtualization Tags: Allyson Klein, Audio Podcast, automated compliance, Bill Hackenberger, Chip Chat, data security, Hytrust, IBM, IBM Cloud Secure Virtualization, Intel, Intel Trusted Execution Technology, multi-cloud infrastructure, virtualization
Categories: Audio Podcast, Big Data, Intel, Intel Chip Chat Tags: Alan Ross, Allyson Klein, Audio Podcast, Big Data, Chip Chat, data security, disaster preparedness, Healthcare, Intel, PaaS, Platform as a Service
Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights Tags: Allyson Klein, data compression, Data Encryption, data security, Edward Pullin, Intel, Network Insights, NFV, QuickAssist
Categories: Business Solutions for IT Managers, Fujitsu, Information Technology, Intel, IT White Papers Tags: Business Solutions for IT Managers, data security, energy efficiency, Fujitsu, Intel, Intel vPro, IT Best Practices, IT Business Value, IT Whitepaper, pdf, remote management, Spain
|
IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…] |
Watch/download video
|
|
Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, privacy, privacy principles, protect to enable, Security
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, governance, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
|
Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: Cloud Security, data security, Eric Carpenter, Jay Kim, networking, Scott Durant, Security, storage
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: 9/11, Brad Ellison, Business Continuity, cyber attacks, Cyber Risk Management, data security, disaster preparedness, FEMA, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel
|
In this podcast, Matt Kixmoeller, VP of Product Management for Veritas NetBackup and Pat Hanavan, VP of Product Management for Backup Exec, have a high-level discussion around Symantec’s Next Generation Data Protection strategy. For more information, visit the business section [See the full post…] |
Listen/download audio
|
|
Categories: Corporate, Symantec Tags: Backup Exec, data security, Matt Kixmoeller, NetBackup, Next Generation Data Protection, Pat Hanavan, storage, Symantec, Veritas
|
In this podcast, Marty Ward, Director of Product Marketing in the Data Protection group, discusses the updated NetBackup platform, and how it is a part of Symantec’s Next Generation Data Protection strategy. For more information, visit the business section at [See the full post…] |
Listen/download audio
|
|
Categories: Corporate, Symantec Tags: Data Protection, data security, Marty Ward, NetBackup, storage, Symantec
|
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint.
This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Andre Gold, Application Security, data security, Enterprise Security, Samir Kapuria, Security, Security Blueprint, Symantec, System Security