Security channel:

Distributed Security System – Intel Chip Chat: Network Insights -Episode 107

Data-Driven Security – Intel Chip Chat: Network Insights – Episode 91

February 15th, 2017 |

Secure Erase for SSDs Helps Sanitize Data and Boost Efficiency

November 17th, 2016 |
Secure Erase for SSDs Helps Sanitize Data and Boost Efficiency

IT Best Practices: Protecting data is one of Intel IT’s most important duties to the enterprise. And the practice of protecting data includes not only data that is actively being used, but also data that needs to be erased [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,

Cloud Security: An Introduction to Microsoft Azure Information Protection

Cloud Security: An Introduction to Microsoft Azure Information Protection

Microsoft Azure Information Protection is a new solution that makes it simpler to classify and protect information, even as it travels outside of your organization.

You’ll see the new options that let you define how your users can classify their [See the full post…]

Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Information Technology, Microsoft, Microsoft Mechanics, Security, Video Podcast Tags: , , , , , , ,

How Safe Are You Online? – Symantec’s 2016 Internet Security Threat Report

How Safe Are You Online? – Symantec’s 2016 Internet Security Threat Report

The 2016 Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. It is compiled using data from the Symantec Global Intelligence Network, which our global cybersecurity experts use to [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Security, Symantec, Video Podcast Tags: , , , , , ,

Oracle: Announcing the SPARC Platform

Oracle: Announcing the SPARC Platform

Highlights of John Fowler, Oracle Executive Vice President of Systems, announcing major new additions to the SPARC platform that for the first time bring the advanced security, efficiency, and simplicity of SPARC to the cloud.

For more information see: [See the full post…]

Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Oracle, Security, Video Podcast Tags: , , , , , , ,

Symantec Managed PKI – Securing Your Enterprise

Symantec Managed PKI – Securing Your Enterprise

Protect your organization against unauthorized access, compromised email, and document tampering. The leading provider of user-friendly cloud-based PKI, Symantec delivers a proven and globally trusted solution used by the Fortune 500 and government agencies.

For more information visit:
symantec.com/managed-pki-service [See the full post…]

Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Security, Symantec, Video Podcast Tags: , , ,

Security Innovation Within OpenStack – Intel Chip Chat – Episode 438

February 16th, 2016 |
Security Innovation Within OpenStack – Intel Chip Chat – Episode 438

In this Intel Chip Chat audio podcast with Allyson Klein: In this livecast from OpenStack Summit Tokyo Ravi Varanasi, General Manager of Cloud Security Solutions at Intel discusses the importance of security to enable enterprise grade OpenStack. He emphasizes [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , ,

Defending the Data Center with Intel Security Technologies – Intel Chip Chat – Episode 417

October 30th, 2015 |

Real-Time Updates for Efficient Traffic – Intel Chip Chat: Network Insights – Episode 14

Real-Time Updates for Efficient Traffic – Intel Chip Chat: Network Insights – Episode 14

Erik Larsson, VP of Marketing at Qosmos, explains the role his company’s traffic analysis software plays in making virtualized networks fast and secure in this interview from Network Virtualization & SDN World. Erik discusses how understanding network traffic in real [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Information Technology, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights, Security Tags: , , , , , , ,

Cloud Security – Do you know where workloads are running? – Ensuring boundary Control in OpenStack Cloud

Deploying Intel Solid-State Drives with Managed Hardware-Based Encryption

Deploying Intel Solid-State Drives with Managed Hardware-Based Encryption

IT Best Practices: To gain the security benefits of centrally managed hardware-based encryption and to better protect Intel’s intellectual property, Intel IT is deploying the Intel Solid-State Drive (Intel SSD) Professional Family (currently consisting of the Intel SSD Pro [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , ,

Streamline Your Digital Life with True Key by Intel Security – Intel Chip Chat – Episode 380

Streamline Your Digital Life with True Key by Intel Security – Intel Chip Chat – Episode 380

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from Mobile World Congress Mark Hocking, Vice President & General Manager of Safe Identity at Intel Security, stops by to talk about the [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Security Tags: , , , , , , , , ,

The Current State of Mobile and IoT Security – Intel Chip Chat – Episode 374

OpenStack and Service Assurance for Enterprises – Intel Chip Chat – Episode 365

February 13th, 2015 |
OpenStack and Service Assurance for Enterprises – Intel Chip Chat – Episode 365

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Kamesh Pemmaraju, a Sr. Product Manager for OpenStack Solutions at Dell, stops by to talk about a few acute needs when deploying [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Dell, Intel, Intel Chip Chat, Security Tags: , , , , , , ,

CompuCom: Simplifying IT Management and Improving the User Experience with Intel

February 13th, 2015 |
CompuCom: Simplifying IT Management and Improving the User Experience with Intel

Business Solutions for IT Managers: CompuCom saves its clients the cost of sending out technicians and cuts downtime while getting rid of wires and boosting security with 5th generation Intel Core vPro processors. [See the full post…]

Download Video FileWatch/download video  

Categories: Business Solutions for IT Managers, Featured, HD Video, Information Technology, Intel, Security, Video Podcast Tags: , , , , , , , , , ,

GAZ-SYSTEM: Mainlining IT Efficiency

November 14th, 2014 |

Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Inside IT: Intel’s Identity and Access Management Program

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want [See the full post…]

Download Audio FileListen/download audio 8:58  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , ,

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Evolving the Mobile Employee Hotspot for IT Consumerization

Evolving the Mobile Employee Hotspot for IT Consumerization

IT Best Practices: IT consumerization and the business need for broader network access present Intel IT with a continuously evolving challenge. The growing adoption of bring your own device (BYOD) poses additional challenges as consumer choices expand and employee [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Enabling Native Email, Calendar, and Contacts on Android Devices

February 25th, 2014 |
Enabling Native Email, Calendar, and Contacts on Android Devices

IT Best Practices: As Intel’s bring-your-own-device (BYOD) program grows and Android devices become more popular, Intel IT wants to help employees using these devices while also keeping the enterprise secure. We are delivering a native email solution that enables [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , ,

Trapezoid: Securing the Cloud

February 24th, 2014 |

Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

February 13th, 2014 |
Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Loretta Nierat, a Group Product Marketing Manager at McAfee, stops by to talk about the current state of security. She gives a brief [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , , , ,

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , ,