Defending the Data Center with Intel Security Technologies – Intel Chip Chat – Episode 417

October 30th, 2015 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Right/Ctrl-click to download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel Chip Chat - iTunes | Spotify | RSS Feed | Email
 

In this Intel Chip Chat audio podcast with Allyson Klein: In this livecast from the Intel Developer Forum (IDF) in San Francisco Ravi Varanasi, General Manager of Cloud Security Solutions at Intel stops by to talk about how Intel is enabling a hardware root of trust to fortify data center security. He describes how Intel Cloud Integrity Technology (CIT) uses Intel Trusted Execution Technology (TXT) and Intel Trusted Platform Module (TPM) to perform integrity checks that form a chain of trust that runs from system boot, all the way to the VMs & the workloads that run on the platform. Ravi also mentions the Data Security Appliance (DSA) which provides data deduplication, compression and encryption while allowing the enterprise to retain control and ownership over their data.

Tags: , , , , , , , , , , , ,
 
Posted in: Audio Podcast, data centers, Intel, Intel Chip Chat, Intel Developer Forum, Security
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.