Security tagged posts:

Securing the Virtual Environment – Intel Chip Chat: Network Insights – Episode 75

Securing the Virtual Environment – Intel Chip Chat: Network Insights – Episode 75

Intel Chip Chat – Network Insights audio podcast with Allyson Klein: In this archive of a livecast from the Intel Builders Executive Summit in San Francisco, Jason Min, Head of Business and Corporate Development at Check Point, introduces his company ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights Tags: , , , , , , , , , , , , ,

Symantec Managed PKI – Securing Your Enterprise

Symantec Managed PKI – Securing Your Enterprise

Protect your organization against unauthorized access, compromised email, and document tampering. The leading provider of user-friendly cloud-based PKI, Symantec delivers a proven and globally trusted solution used by the Fortune 500 and government agencies.

For more information visit: symantec.com/managed-pki-service

Share
Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Security, Symantec, Video Podcast Tags: , , ,

Inside IT: Intel CIO Kim Stevenson Looks to the Year Ahead

May 23rd, 2016 |
Inside IT: Intel CIO Kim Stevenson Looks to the Year Ahead

IT Best Practices: Episode 95 – The Intel IT Annual Performance Report is out. It outlines the technological innovations that are driving growth at Intel, and creating extraordinary opportunities for IT leaders. The report’s release makes this a good time ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , ,

Intel IT: PC Refresh Strategy

Intel IT: PC Refresh Strategy

IT Best Practices: Even with the proliferation of device types, Intel IT continues to adhere to the fundamentals of our PC Refresh Strategy. Listen to John Mahvi explain what we believed in the past and what we believe now.

Share
Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , , , , , , , , ,

Taking enterprise security beyond the edge

October 20th, 2015 |
Taking enterprise security beyond the edge

IT Best Practices: Intel IT is developing a beyond-the-edge security strategy that will enhance security in our environment. This new strategy addresses several drawbacks with today’s approach to security.

Share
Download PDFRead/Download PDF  

Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , , , ,

Cloud Security – Do you know where workloads are running? – Ensuring boundary Control in OpenStack Cloud

Cloud Security – Do you know where workloads are running? – Ensuring boundary Control in OpenStack Cloud

Software Defined Infrastructure: Infrastructure security for policy compliance. Controlling and protecting data center workloads with Intel solutions.

Share
Download Video FileWatch/download video  

Categories: Cloud Computing, Intel, Intel: Intelligent Compute, Intel: Intelligent Networking, Intel: Software Defined Infrastructure, Security Tags: , , , , , , , , , ,

Improving Performance and Security of Big Data and Cloud Solutions

Improving Performance and Security of Big Data and Cloud Solutions

Intelligent Networking: Intel QuickAssist Technology (Intel QAT) offers encryption/decryption and compression/decompression acceleration to developers, enterprises and cloud service providers with APIs, add-in cards or chipset for increased performance and security.

Share
Download PDFRead/Download PDF  

Categories: Intel, Intel: Intelligent Networking, Intel: Software Defined Infrastructure Tags: , , , , , , , , , , , ,

CompuCom: Simplifying IT Management and Improving the User Experience with Intel

February 13th, 2015 |
CompuCom: Simplifying IT Management and Improving the User Experience with Intel

Business Solutions for IT Managers: CompuCom saves its clients the cost of sending out technicians and cuts downtime while getting rid of wires and boosting security with 5th generation Intel Core vPro processors.

Share
Download Video FileWatch/download video  

Categories: Business Solutions for IT Managers, Featured, HD Video, Information Technology, Intel, Security, Video Podcast Tags: , , , , , , , , , ,

Inside IT: A First Look at 2015 With Intel CIO Kim Stevenson

February 10th, 2015 |
Inside IT: A First Look at 2015 With Intel CIO Kim Stevenson

IT Best Practices: Episode 94 – The start of a new year is a great time to take stock. With that in mind, here’s a wide-ranging conversation with Intel Corporate Vice President and CIO Kim Stevenson. In this podcast you’ll ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , ,

Bringing Security to the Cloud – Intel Chip Chat – Episode 355

Bringing Security to the Cloud – Intel Chip Chat – Episode 355

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from the Intel Developer Forum, Jim Comfort, the GM of Cloud Services in the Global Technology Services Unit at IBM and Karna Bojjireddy, Lead ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Developer Forum Tags: , , , , , , , , , , , , ,

Network Security Challenges and Solutions – Intel Chip Chat – Episode 329

Network Security Challenges and Solutions – Intel Chip Chat – Episode 329

In this Intel Chip Chat audio podcast with Allyson Klein:Bikram Gupta, a Senior Product Manager at Intel, stops by to talk about the Intel Security suite of solutions including PC/mobile phone, security management, firewall and network security. With the move ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Intel, Intel Chip Chat Tags: , , , , , , , ,

Big Data: Rethink Privacy

Big Data: Rethink Privacy

IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting traditional principles of fair information practices in a ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Big Data, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Video Podcast Tags: , , , , , , , , , , , ,

Securing the Data Center – Intel Chip Chat – Episode 324

September 23rd, 2014 |
Securing the Data Center – Intel Chip Chat – Episode 324

In this Intel Chip Chat audio podcast with Allyson Klein: Jim Greene, a product marketing engineer focused on server security technologies at Intel, stops by to talk about his book: Intel Trusted Execution Technology for Server Platforms: A Guide to ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Intel, Intel Chip Chat Tags: , , , , , , ,

Inside IT: Faster Threat Detection with Security Business Intelligence

September 9th, 2014 |
Inside IT: Faster Threat Detection with Security Business Intelligence

IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists in ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , ,

Inside IT: Developing Applications With Security Built-In

August 19th, 2014 |
Inside IT: Developing Applications With Security Built-In

IT Best Practices: Episode 82 – The use of mobile devices in the enterprise – and everywhere for that matter – has increased dramatically over the past several years. This is as true at Intel as anywhere. As the use ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , ,

Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Inside IT: Intel’s Identity and Access Management Program

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want to ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , ,

Intel and Atos: The Evolution of the Enterprise Client Experience

Intel and Atos: The Evolution of the Enterprise Client Experience

Business Solutions for IT Managers: With Ultrabook devices, Intel and Atos are helping address evolving enterprise needs and providing the performance, flexibility, and mobility employees expect plus the security, manageability, connectivity, and cost-effectiveness enterprises require.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers Tags: , , , , , , , ,

Inside IT: Intel’s SaaS Security Playbook

Inside IT: Intel’s SaaS Security Playbook

IT Best Practices: Episode 78 – The SMAC stack is changing the nature of business. SMAC is Social, Mobile, Analytics, and Cloud. Advances in these areas have allowed many operations in the enterprise to move to the cloud, and Software ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , , ,

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Business Solutions for IT Managers: Unisys chooses Intel Xeon processors to help its Forward! platform deliver predictable performance, scalability, and security.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , ,

Inside IT: Making It Safe for Intel to Go Fast

May 26th, 2014 |
Inside IT: Making It Safe for Intel to Go Fast

IT Best Practices: Episode 76 – The technical and organizational landscape has changed dramatically in the past few years. Organizations have a wealth of new opportunities for greater employee productivity and operational efficiency. But these opportunities, combined with an increase ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , ,

Security and Mobile Devices – Intel Chip Chat – Episode 303

Security and Mobile Devices – Intel Chip Chat – Episode 303

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from a recent trip to Mobile World Congress, Lianne Caetano, the Director of Mobile Product Marketing for McAfee, stops by to talk about the ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Intel, Intel Chip Chat Tags: , , , , , , , , , , , ,

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security by ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

February 13th, 2014 |
Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Loretta Nierat, a Group Product Marketing Manager at McAfee, stops by to talk about the current state of security. She gives a brief history ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , , , ,

IT Best Practices: Landesbetrieb IT.NRW: Paperless Government

January 23rd, 2014 |
IT Best Practices: Landesbetrieb IT.NRW: Paperless Government

Business Solutions for IT Managers: Landesbetrieb IT.NRW is a pioneer in secure mobile computing with Intel Core i5 and i7 processors.

Share
Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: , , , , , , , , , , ,

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy office. ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , ,