information security tagged posts:

SIEM – Intel IT’s Security Business Intelligence Architecture

September 16th, 2014 |
SIEM – Intel IT’s Security Business Intelligence Architecture

IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.

See also: SIEM ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as social ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

IT Best Practices: The Polarity of Security and Privacy

October 25th, 2013 |
IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: Security and privacy are like magnets. When they are turned in the right direction they are perfectly binding. But if one starts turning, they start to push away from each other. Listen to Malcolm Harkins, Intel Chief ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

Securely Connecting Smartphones and Tablets to the Enterprise

Securely Connecting Smartphones and Tablets to the Enterprise

IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed devices ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

Using Data Anonymization To Enhance Cloud Security

January 21st, 2013 |
Using Data Anonymization To Enhance Cloud Security

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Share
Download Video FileWatch/download video  

Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: , , , , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , ,

Enhancing Cloud Security Using Data Anonymization

Enhancing Cloud Security Using Data Anonymization

IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of our ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security, Technology Tags: , , , , , , ,

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

Improving Healthcare Risk Assessments to Maximize Security Budgets

Improving Healthcare Risk Assessments to Maximize Security Budgets

IT Best Practices: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated through ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Healthcare, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , ,

Intel IT – Protect to Enable

February 8th, 2012 |
Intel IT – Protect to Enable

Learn about Intel’s IT best practices and our new information security strategy…. a new architecture that is designed to increase productivity, agility and innovation, while actually decreasing risk.

Share
Download Video FileWatch/download video  

Categories: HD Video, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , ,

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

January 30th, 2012 |
IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.  

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Measuring the Value of Information Security Investments

January 30th, 2012 |
Measuring the Value of Information Security Investments

IT Best Practices: Intel IT finance created a new information security investment model which allows IT management, financial experts and security professionals to analyze and prioritize investments, based on risk mitigation against a variety of security threats. A key strength ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

Get Direct Insight into Intel IT’s Best Practices

Get Direct Insight into Intel IT’s Best Practices

IT Best Practices: The IT@Intel program connects IT professionals around the world with their IT peers inside our organization – sharing lessons learned, methods and strategies. Our goal is simple: Share the Intel IT best practices that create business value ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , , , ,

IT Best Practices: Information Security and Cloud Computing

IT Best Practices: Intel IT Embraces Social Computing

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , ,

Intel IT Best Practices: Rethinking Information Security with Intel CISO

Intel IT Best Practices: Rethinking Information Security with Intel CISO

In this short IT Security vblog, Malcolm Harkins, Intel CISO, talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel IT Best Practices: Intel CISO Discusses Misperception of Risk

Intel CISO, Malcolm Harkins believes that underestimating or over exaggerating risk is one of the biggest vulnerabilities we face. Watch this short vblog to hear Malcolm’s explanation.

Share
Download Video FileWatch/download video  

Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , ,

Intel IT Best Practices: PC Fleet Management

Intel IT Best Practices: PC Fleet Management

Intel IT Best Practices: In this IT@Intel Executive Insights, we explain how Intel IT uses regular refresh, smart technology, the benefits of consumerization and proactive support to help us maintain our PC fleet and empower our 80,000 users across the ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , ,

Securing Intel’s External Online Presence

Securing Intel’s External Online Presence

To protect Intel and its customers, Intel IT established a program that assesses, monitors, and enforces the security, privacy, and regulatory compliance of externally facing Intel-branded Web sites and online marketing programs.

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , ,

Inside IT: Security

April 21st, 2011 |
Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT security with ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , ,

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month evaluation of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Microsoft Tags: , , , , , , , , , , , , , , , ,

Intel IT Performance Report – Creating Business Value

December 10th, 2010 |
Intel IT Performance Report – Creating Business Value

IT Business Value: Welcome to our ninth edition of the Intel IT Performance Report. As we closed last year’s edition, we identified some of the many challenges IT organizations would face in 2009 given the economic environment, and we also ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , , , ,