Security channel:

Defending the Data Center with Intel Security Technologies – Intel Chip Chat – Episode 417

October 30th, 2015 |

Real-Time Updates for Efficient Traffic – Intel Chip Chat: Network Insights – Episode 14

Real-Time Updates for Efficient Traffic – Intel Chip Chat: Network Insights – Episode 14

Erik Larsson, VP of Marketing at Qosmos, explains the role his company’s traffic analysis software plays in making virtualized networks fast and secure in this interview from Network Virtualization & SDN World. Erik discusses how understanding network traffic in real [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Information Technology, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights, Security Tags: , , , , , , ,

Cloud Security – Do you know where workloads are running? – Ensuring boundary Control in OpenStack Cloud

Deploying Intel Solid-State Drives with Managed Hardware-Based Encryption

Deploying Intel Solid-State Drives with Managed Hardware-Based Encryption

IT Best Practices: To gain the security benefits of centrally managed hardware-based encryption and to better protect Intel’s intellectual property, Intel IT is deploying the Intel Solid-State Drive (Intel SSD) Professional Family (currently consisting of the Intel SSD Pro [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , ,

Streamline Your Digital Life with True Key by Intel Security – Intel Chip Chat – Episode 380

Streamline Your Digital Life with True Key by Intel Security – Intel Chip Chat – Episode 380

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from Mobile World Congress Mark Hocking, Vice President & General Manager of Safe Identity at Intel Security, stops by to talk about the [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Security Tags: , , , , , , , , ,

The Current State of Mobile and IoT Security – Intel Chip Chat – Episode 374

OpenStack and Service Assurance for Enterprises – Intel Chip Chat – Episode 365

February 13th, 2015 |
OpenStack and Service Assurance for Enterprises – Intel Chip Chat – Episode 365

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Kamesh Pemmaraju, a Sr. Product Manager for OpenStack Solutions at Dell, stops by to talk about a few acute needs when deploying [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Dell, Intel, Intel Chip Chat, Security Tags: , , , , , , ,

CompuCom: Simplifying IT Management and Improving the User Experience with Intel

February 13th, 2015 |
CompuCom: Simplifying IT Management and Improving the User Experience with Intel

Business Solutions for IT Managers: CompuCom saves its clients the cost of sending out technicians and cuts downtime while getting rid of wires and boosting security with 5th generation Intel Core vPro processors. [See the full post…]

Download Video FileWatch/download video  

Categories: Business Solutions for IT Managers, Featured, HD Video, Information Technology, Intel, Security, Video Podcast Tags: , , , , , , , , , ,

GAZ-SYSTEM: Mainlining IT Efficiency

November 14th, 2014 |

Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Inside IT: Intel’s Identity and Access Management Program

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , ,

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Evolving the Mobile Employee Hotspot for IT Consumerization

Evolving the Mobile Employee Hotspot for IT Consumerization

IT Best Practices: IT consumerization and the business need for broader network access present Intel IT with a continuously evolving challenge. The growing adoption of bring your own device (BYOD) poses additional challenges as consumer choices expand and employee [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , ,

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , ,

Enabling Native Email, Calendar, and Contacts on Android Devices

February 25th, 2014 |
Enabling Native Email, Calendar, and Contacts on Android Devices

IT Best Practices: As Intel’s bring-your-own-device (BYOD) program grows and Android devices become more popular, Intel IT wants to help employees using these devices while also keeping the enterprise secure. We are delivering a native email solution that enables [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , ,

Trapezoid: Securing the Cloud

February 24th, 2014 |

Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

February 13th, 2014 |
Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Loretta Nierat, a Group Product Marketing Manager at McAfee, stops by to talk about the current state of security. She gives a brief [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , , , ,

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , ,

Powered by Intel Cloud Technology – Intel Chip Chat – Episode 290

February 6th, 2014 |
Powered by Intel Cloud Technology – Intel Chip Chat – Episode 290

In this Intel Chip Chat audio podcast with Allyson Klein: Raejeanne Skillern from Intel and Faiz Parkar from Canopy stop by to discuss the launch of the “Powered by Intel Cloud Technology” program, which will make service providers’ cloud [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Intel, Intel Chip Chat, Security Tags: , , , , , , , , ,

IT Best Practices: Landesbetrieb IT.NRW: Paperless Government

January 23rd, 2014 |

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , ,

COMGUARD: Expanding its Portfolio

COMGUARD: Expanding its Portfolio

Business Solutions for IT Managers: Value-add IT distributor COMGUARD continuously seeks to broaden the enterprise security services it offers to customers. This is essential to remain competitive within its market segment. Together with Intel, COMGUARD set up a demonstration suite [See the full post…]

Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Intel, IT White Papers, Security, Technology Tags: , , , , , , , , , , ,

Grove City College: Enhancing Academic Mobility

December 19th, 2013 |

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , , ,

IT Best Practices: People are the Perimeter

December 9th, 2013 |
IT Best Practices: People are the Perimeter

IT Best Practices: The enterprise walls and network are no longer the only pieces of the security perimeter. People are the new perimeter. People are increasing the perimeter via a myriad of mobile devices and new channels, such as [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , , , , , ,

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices:
Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,