Enterprise Security tagged posts:

Insider Threat Field Guide

October 21st, 2015 |
Insider Threat Field Guide

IT Best Practices: One of the most serious security challenges facing enterprises today is that of insider threat. However, many enterprises do not fully understand the scope of the problem and until recently, there has been a lack of tools ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , ,

Taking enterprise security beyond the edge

October 20th, 2015 |
Taking enterprise security beyond the edge

IT Best Practices: Intel IT is developing a beyond-the-edge security strategy that will enhance security in our environment. This new strategy addresses several drawbacks with today’s approach to security.

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

September 16th, 2014 |
SIEM – Intel IT’s Security Business Intelligence Architecture

IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.

See also: SIEM ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,

IT Business Review: Striking a balance between protection and enablement

February 10th, 2014 |
IT Business Review: Striking a balance between protection and enablement

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more capable ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel IT Business Review, IT White Papers, IT@Intel Tags: , , , , , , , , , , ,

COMGUARD: Expanding its Portfolio

COMGUARD: Expanding its Portfolio

Business Solutions for IT Managers: Value-add IT distributor COMGUARD continuously seeks to broaden the enterprise security services it offers to customers. This is essential to remain competitive within its market segment. Together with Intel, COMGUARD set up a demonstration suite ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Intel, IT White Papers, Security, Technology Tags: , , , , , , , , , , ,

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices: Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated manageability, compliance ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Android Devices in a BYOD Environment

November 7th, 2013 |
Android Devices in a BYOD Environment

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Granular Trust Model – Improving Enterprise Security

November 30th, 2012 |
Granular Trust Model – Improving Enterprise Security

IT Best Practices: Intel IT has completed a pilot of its granular trust model, designed to support key initiatives such as IT consumerization and cloud computing. This trust model provides dynamic security controls and user access to reduce enterprise ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Share
Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,

Intel IT Annual Report: 2012 Mid-Year Update

September 17th, 2012 |
Intel IT Annual Report: 2012 Mid-Year Update

Intel IT Annual Report: 2012 mid-year update that shares progress on key strategic initiatives that delivered business value to Intel — cloud computing, IT consumerization, business intelligence, social computing and enterprise security.

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, data centers, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , ,

Evaluating Ultrabook Devices for the Enterprise

Evaluating Ultrabook Devices for the Enterprise

IT Best Practices: Intel IT is proactively gathering data about Ultrabook devices and how they fit into the enterprise, in anticipation of a wave of new devices and form factors, and the associated expectations from employees who want to buy ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , , , , , , , ,

Intel IT – Protect to Enable

February 8th, 2012 |
Intel IT – Protect to Enable

Learn about Intel’s IT best practices and our new information security strategy…. a new architecture that is designed to increase productivity, agility and innovation, while actually decreasing risk.

Share
Download Video FileWatch/download video  

Categories: HD Video, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , ,

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

January 30th, 2012 |
IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.  

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Measuring the Value of Information Security Investments

January 30th, 2012 |
Measuring the Value of Information Security Investments

IT Best Practices: Intel IT finance created a new information security investment model which allows IT management, financial experts and security professionals to analyze and prioritize investments, based on risk mitigation against a variety of security threats. A key strength ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

2011-2012 Intel IT Performance Report Video with Diane Bryant

January 26th, 2012 |
2011-2012 Intel IT Performance Report Video with Diane Bryant

IT Best Practices: Explore with Intel Vice President and CIO Diane Bryant Intel IT’s strategies and actions that created business value for Intel in 2011, as well as their key focus areas for 2012, in the 11th edition of the ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, HD Video, Intel, Intel IT, Video Podcast Tags: , , , , , , , ,

JUST RELEASED! 2011-2012 Intel IT Performance Report

January 25th, 2012 |
JUST RELEASED!  2011-2012 Intel IT Performance Report

IT Best Practices: Explore Intel IT’s strategies and actions that created business value for Intel in 2011, as well as their key focus areas for 2012, in the 11th edition of the Intel IT Performance Report. Key topics include ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , ,

Securing Intel’s External Online Presence

Securing Intel’s External Online Presence

To protect Intel and its customers, Intel IT established a program that assesses, monitors, and enforces the security, privacy, and regulatory compliance of externally facing Intel-branded Web sites and online marketing programs.

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , ,

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month evaluation of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Microsoft Tags: , , , , , , , , , , , , , , , ,

vPro Technology: Security Use Cases

April 2nd, 2009 |
vPro Technology: Security Use Cases

Although the latest virus scare has yet to materialize into an attack — security experts tell us that Conficker, as of April 1, 2009, remains dormant — it puts a exclamation point on the notion that IT departments need clear ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Healthcare, Information Technology, Intel, Intel IT, Intel vPro, IT@Intel Tags: , , , , , , , , , , , , , , , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 4

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 4

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Results of the Participant Survey)

This is Part Four of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 3

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 3

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (The Blueprint in Various Industries)

This is Part Three of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 2

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 2

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Operational and Strategic Elements of the Blueprint)

This is Part Two of the second episode of the The “Building Confidence in Enterprise Security” video podcast ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint.

This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre Gold. ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , , , , ,