vPro Technology: Security Use Cases

April 2nd, 2009 |
Image for FaceBook

Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
This post can be linked to directly with the following short URL:

The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other

This video file can be linked to by copying the following URL:

Right/Ctrl-click to download the video file.
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email

Although the latest virus scare has yet to materialize into an attack — security experts tell us that Conficker, as of April 1, 2009, remains dormant — it puts a exclamation point on the notion that IT departments need clear vision of every PC in their networks as well as access to those PCs. The ability of the IT administrator to reach into the network goes beyond patches to negate worms. Many threats come from within the organization. In this video, Intel IT security specialists discuss new enterprise security use cases using Intel’s vPro technology and address e-Discovery and investigations, data protection and loss prevention, and system health and updates.

For more information on Intel IT Best Practices, please visit intel.com/IT

Tags: , , , , , , , , , , , , , , , , , , ,
Posted in: Corporate, Healthcare, Information Technology, Intel, Intel IT, Intel vPro, IT@Intel