data security tagged posts:

Gaining Actionable Insights From Big Data – Intel Chip Chat – Episode 403

September 2nd, 2015 |
Gaining Actionable Insights From Big Data – Intel Chip Chat – Episode 403

In this Intel Chip Chat audio podcast with Allyson Klein: Alan Ross, Senior Principal Engineer at Intel outlines how quickly the amount of data that enterprises deal with is scaling from millions to tens of billions and how gaining actionable ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Intel, Intel Chip Chat Tags: , , , , , , , , , ,

Security for Data at Rest or in Motion – Intel Chip Chat: Network Insights – Episode 7

Security for Data at Rest or in Motion – Intel Chip Chat: Network Insights – Episode 7

Intel Chip Chat: Network Insights: Edward Pullin, Product Line Manager at Intel, stops by to discuss Intel QuickAssist Acceleration Technology for security and compression. He describes how the technology is helping Telecommunication organizations secure their data whether in motion or ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights Tags: , , , , , , , ,

Fujitsu Spain: Revolutionizing Public Administration

Fujitsu Spain: Revolutionizing Public Administration

Business Solutions for IT Managers: Fujitsu Spain makes the most of the Intel vPro platform for optimum data security, remote management, and energy efficiency.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Fujitsu, Information Technology, Intel, IT White Papers Tags: , , , , , , , , , , ,

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: , , , , , , ,

Inside IT: Disaster Preparedness for the Data Center

September 20th, 2011 |
Inside IT: Disaster Preparedness for the Data Center

IT Best Practices: Episode 8 – With the ten-year anniversary of 9-11, we’re reminded of the importance of being prepared for disaster and how that day changed the way many IT professionals view data security. With Texas fires and Hurricane ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Vision 2008 Podcast: Next Generation Data Protection

Vision 2008 Podcast: Next Generation Data Protection

In this podcast, Matt Kixmoeller, VP of Product Management for Veritas NetBackup and Pat Hanavan, VP of Product Management for Backup Exec, have a high-level discussion around Symantec’s Next Generation Data Protection strategy. For more information, visit the business ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Corporate, Symantec Tags: , , , , , , , ,

Vision 2008 Podcast: NetBackup 6.5.2 Product Overview

Vision 2008 Podcast: NetBackup 6.5.2 Product Overview

In this podcast, Marty Ward, Director of Product Marketing in the Data Protection group, discusses the updated NetBackup platform, and how it is a part of Symantec’s Next Generation Data Protection strategy. For more information, visit the business section ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Corporate, Symantec Tags: , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint.

This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre Gold. ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , , ,