mobile security tagged posts:

The Current State of Mobile and IoT Security – Intel Chip Chat – Episode 374

The Current State of Mobile and IoT Security – Intel Chip Chat – Episode 374

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from Mobile World Congress in Barcelona, Gary Davis (twitter.com/garyjdavis), Chief Consumer Security Evangelist at Intel Security stops by to talk about the current state ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , ,

Security and Mobile Devices – Intel Chip Chat – Episode 303

Security and Mobile Devices – Intel Chip Chat – Episode 303

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from a recent trip to Mobile World Congress, Lianne Caetano, the Director of Mobile Product Marketing for McAfee, stops by to talk about the ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Intel, Intel Chip Chat Tags: , , , , , , , , , , , ,

Enabling Native Email, Calendar, and Contacts on Android Devices

February 25th, 2014 |
Enabling Native Email, Calendar, and Contacts on Android Devices

IT Best Practices: As Intel’s bring-your-own-device (BYOD) program grows and Android devices become more popular, Intel IT wants to help employees using these devices while also keeping the enterprise secure. We are delivering a native email solution that enables employees ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to mitigate ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,