information security tagged posts:

Securing Intel’s External Online Presence

Securing Intel’s External Online Presence

To protect Intel and its customers, Intel IT established a program that assesses, monitors, and enforces the security, privacy, and regulatory compliance of externally facing Intel-branded Web sites and online marketing programs. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , ,

Inside IT: Security

April 21st, 2011 |
Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT security with [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , ,

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Microsoft Tags: , , , , , , , , , , , , , , , ,

Intel IT Performance Report – Creating Business Value

December 10th, 2010 |

IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

November 26th, 2010 |
IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

IT Best Practices: Intel IT is actively integrating employee-owned hand-held devices into our enterprise environment. With safeguards in place to protect data and intellectual property, we are allowing employees to select the tools that suit their personal work styles [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

Enabling Device-Independent Mobility with Dynamic Virtual Clients

October 19th, 2010 |
Enabling Device-Independent Mobility with Dynamic Virtual Clients

IT Best Practices: To enable device-independent mobility (DIM) at Intel, Intel IT is considering implementing dynamic virtual client (DVC) technology, which uses containerized software appliances to abstract the OS; applications; corporate and personal data and workspaces; and user-specific settings. [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , ,

Developing an Enterprise Social Computing Strategy

October 14th, 2010 |
Developing an Enterprise Social Computing Strategy

IT Best Practices: Intel IT is implementing an enterprise-wide social computing platform that combines professional networking tools with social media such as wikis and blogs, and integrates with existing enterprise software. Our goal is to transform collaboration across Intel, [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , ,

Prioritizing Information Security Risks with Threat Agent Risk Assessment

October 12th, 2010 |
Prioritizing Information Security Risks with Threat Agent Risk Assessment

IT Business Value: Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the immense number of possible information security attacks into a digest of only those exposures most likely to occur. This methodology identifies threat [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , ,

Getting Ahead of Malware

Getting Ahead of Malware

IT Best Practices: To minimize the threat posed by malicious software, or malware, making its way into the enterprise, Intel IT has established a process that actively seeks to identify and take action against the malware before it reaches [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Managing a Global Wireless LAN

September 21st, 2010 |
Managing a Global Wireless LAN

IT Innovation: Intel IT developed a new management and support structure for wireless LANs (WLANs). We consolidated first-level support and centralized the WLAN engineer workgroup as well as device management. We manage the WLAN as an integrated service that [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , ,

Evaluating Thin-Client IT Security in a Changing Threat Landscape

September 19th, 2010 |
Evaluating Thin-Client IT Security in a Changing Threat Landscape

IT Client Technology: Intel IT’s security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Recent cyber-attacks on a number of high-profile targets provided added impetus to re-evaluate [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , ,

Deploying Full Disk Encryption to Protect the Enterprise

Deploying Full Disk Encryption to Protect the Enterprise

IT Information Security: As our CIO Diane Bryant says “Intel’s success is based on our intellectual property”. To help protect this valuable resource and employees’ personal information, in 2009 Intel IT began deploying full disk encryption on all corporate-owned [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Security Plan – Risk Assessment, Modeling and War Gaming

October 31st, 2007 |
Security Plan – Risk Assessment, Modeling and War Gaming

Security risk assessments, security risk modeling, and protecting against security threats by maintaining a threat agent library — these and other programs form the basis for understanding threats to network security for Intel. In this video podcast, TIm Casey, senior [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

Intel IT Information Security Pro Casey Says People Throw the Bombs

September 12th, 2007 |
Intel IT Information Security Pro Casey Says People Throw the Bombs

“People are the ultimate threat,” says Tim Casey, a senior strategic analyst for information security at Intel. “People write the viruses, people throw the bombs.” In this interview with PodTech’s Jason Lopez, Casey says that security is all about being [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, InfoWorld, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , , , , , , ,