vPro Technology: Security Use Cases

April 2nd, 2009 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The video player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
This video file can be linked to by copying the following URL:


 
Download the video file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

Although the latest virus scare has yet to materialize into an attack — security experts tell us that Conficker, as of April 1, 2009, remains dormant — it puts a exclamation point on the notion that IT departments need clear vision of every PC in their networks as well as access to those PCs. The ability of the IT administrator to reach into the network goes beyond patches to negate worms. Many threats come from within the organization. In this video, Intel IT security specialists discuss new enterprise security use cases using Intel’s vPro technology and address e-Discovery and investigations, data protection and loss prevention, and system health and updates.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , , , , , , , ,
 
Posted in: Corporate, Healthcare, Information Technology, Intel, Intel IT, Intel vPro, IT@Intel