Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Chief Information Security Officer, CISO, Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
|
IT Best Practices: Intel IT is proactively implementing a bring-your-own-device (BYOD) program that allows employees the flexibility to use personally owned devices like smartphones and tablets to connect to the corporate network for some IT services. While this presents [See the full post…] |
Read/Download PDF
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: bring your own device, BYOD, consumerization, Cyber Risk Management, data recovery, eDiscovery, electronic discovery, Intel IT, IT Best Practices, IT Business Value, it leadership, IT management, it operations, IT Strategic Planning, IT@Intel, SFF, small form factor devices, storage architecture
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Computing, Cloud Computing Security, Cyber Risk Management, Data Anonymization, information security, Intel IT, IT Best Practices, IT@Intel
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
Categories: Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: Cyber Risk Management, Cyber-Safety, Cybersecurity, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, McAfee
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: AFRL, Air Force Research Laboratory, Business Solutions for IT Managers, Citrix, Collaboration for Government Users, Cyber Risk Management, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cyber Risk Management, Intel, IT Best Practices, IT Business Value, IT Whitepaper, Lafarge, pdf, secure computing, Ultrabook
Categories: Big Data, Business Solutions for IT Managers, Cloud Computing, Corporate, data centers, Information Technology, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cyber Risk Management, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security, Swiss Mobiliar
Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: Alan Ross, Big Data, Cyber Risk Management, cyber security, Enterprise Security, information security, Insider Threats, IT Best Practices, IT@Intel, Security Business Intelligence, SIEM
Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HPE - Hewlett Packard Enterprise, Intel, IT White Papers, Security Tags: Aria Systems, blade servers, Business Solutions for IT Managers, Cloud Computing, Cyber Risk Management, data centers, Hewlett-Packard, HP, HP ProLiant, HPE, Intel, Intel Xeon processor E5, IT Best Practices, IT Business Value, IT Whitepaper, pdf, scalability, Security
Categories: Audio Podcast, Cloud Computing, data centers, Intel, Intel Conversations in the Cloud, Security, Technology Tags: Allyson Klein, Cloud Computing, Conversations in the Cloud, Cyber Risk Management, Intel, Jose Gonzalez, National Australia Bank, ODCA, Open Data Center Alliance, Robert Rounsavall, Security, Terremark, Trapezoid, Trapezoid Data Intelligence
Categories: Business Solutions for IT Managers, Healthcare, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cyber Risk Management, Health Services, Healthcare IT, Intel, Intel core vPro, IT Best Practices, IT Business Value, IT Whitepaper, Netown Corporation, pdf, Security, telehealth services
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: Air Products, Business Solutions for IT Managers, Cyber Risk Management, Intel, Intel core vPro, IT Best Practices, IT Business Value, IT Whitepaper, pdf, remote management
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Computing, Cloud Computing Security, Cyber Risk Management, Data Anonymization, information security, Intel IT, IT Best Practices, IT@Intel
|
IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…] |
Read/Download PDF
|
|
Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security, Technology Tags: Cloud Computing, Cloud Computing Security, Cyber Risk Management, Data Anonymization, information security, Intel IT, IT Best Practices, IT@Intel
|
IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, information security, Intel IT, Intel vPro Technology, IT Best Practices, IT@Intel, Solid State Drives, SSD
Categories: Business Solutions for IT Managers, Corporate, Information Technology, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cyber Risk Management, Hungary, Intel, Intel Anti-Theft Technology, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Symantec, System Integration, WSH
Categories: Audio Podcast, Big Data, Intel, Intel Conversations in the Cloud, Security Tags: Cloud Builders, Cloud Computing, compliance, Conversations in the Cloud, Cyber Risk Management, Identity Management, Intel, malware, McAfee, podcast, Security, Tim Roddy
Categories: Audio Podcast, data centers, Security, Tech Conferences and Events, Technology Tags: Best of Interop, Cyber Risk Management, Interop, Interop 2012, Interop 2012 Las Vegas, Interop Las Vegas, McAfee, Security, Tyler Carter
Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, B.I., Big Data, Corporate, Cyber Risk Management, Grant Babb, information technology, Inside IT, Insider Threats, Intel, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel, Security
|
IT Best Practices: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated [See the full post…] |
Read/Download PDF
|
|
Categories: Healthcare, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Cyber Risk Management, Healthcare, Healthcare IT, information security, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, risk management
|
IT Security: Defending against intrusion was a hot topic at previous RSA conferences. But users are using their devices outside the network perimeter of their organizations, which exposes data like never before. In this podcast we asked several security [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Big Data, Editorial, Inertia: Technology News and Opinion, Security, Tech Conferences and Events Tags: 2012 RSA Security Conference, Akamai, Amit Khosla, Cyber Risk Management, Dave Elliott, George Gerchow, Hewlett-Packard, Homeland Security, HP, HPE, Kaspersky Lab, Martha Gilbertson, Michael Sutton, Mike Smith, Moscone Center, RSA, RSA Security Conference, Symantec, Tim Armstrong, Trisha Travaline, VMware, Zscaler
|
IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.
To support this initiative, we have [See the full post…] |
Read/Download PDF
|
|
Categories: Intel IT, IT White Papers, IT@Intel, Security Tags: BYOC, BYOD, consumerization, Cyber Risk Management, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Security, smart phones, tablets
Categories: HD Video, Intel, Intel IT, IT@Intel, Video Podcast Tags: Cyber Risk Management, Enterprise Security, information security, IntelIT, IT Best Practices, IT@Intel, protect to enable
|
IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.
[See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Computing, Cloud Server, Cyber Risk Management, Data Center Solutions, Enterprise Security, High Trust Zone, high-security servers, HTZ, information security, Intel IT, IT Best Practices, IT@Intel, private cloud, virtualization