encryption tagged posts:

Cyber Threats Are Becoming More Sophisticated, So Should You

January 18th, 2022 |
Cyber Threats Are Becoming More Sophisticated, So Should You

Cybercrime has become a sophisticated enterprise. Hacking tools built on the latest technologies such as AI or hybrid cloud are available on the black market, where stolen data is also bought and sold. And digital tools used in cinema have [See the full post…]

Download Audio FileListen/download audio 23:53  

Categories: Artificial Intelligence, Audio Podcast, Security, Technology, This Moment Matters Tags: , , , , , , , , , , , , , , , ,

Increasing Product Quality and Yield Using Machine Learning

Increasing Product Quality and Yield Using Machine Learning

IT Best Practices: Sensor data and analytics, powered by a robust Industrial Internet of Things (IIoT) solution can help manufacturers gain actionable insights into the behavior and performance of their tools in real time. With earlier and more accurate [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , ,

Security Innovation Within OpenStack – Intel Chip Chat – Episode 438

February 16th, 2016 |
Security Innovation Within OpenStack – Intel Chip Chat – Episode 438

In this Intel Chip Chat audio podcast with Allyson Klein: In this livecast from OpenStack Summit Tokyo Ravi Varanasi, General Manager of Cloud Security Solutions at Intel discusses the importance of security to enable enterprise grade OpenStack. He emphasizes [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , , , ,

Improving Performance and Security of Big Data and Cloud Solutions

Improving Performance and Security of Big Data and Cloud Solutions

Intelligent Networking: Intel QuickAssist Technology (Intel QAT) offers encryption/decryption and compression/decompression acceleration to developers, enterprises and cloud service providers with APIs, add-in cards or chipset for increased performance and security. [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel, Intel: Intelligent Networking, Intel: Software Defined Infrastructure Tags: , , , , , , , , , , , ,

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices:
Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated [See the full post…]

Download PDFRead/Download PDF  

Categories: Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Inside IT: McAfee Drive Encryption at Intel

November 12th, 2013 |
Inside IT: McAfee Drive Encryption at Intel

IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Big Data, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , ,

DuPont Increases Security with Intel-Based Encryption

February 18th, 2013 |

Managing Intel Solid-State Drives Using Intel vPro Technology

Managing Intel Solid-State Drives Using Intel vPro Technology

IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

October 14th, 2011 |

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

Security in the Data Center & Cloud – Intel Chip Chat – Episode 133

In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson Intel Director of Xeon Platform Marketing, Intel Rock Star, and frequent Intel Chip Chat guest discusses security, embedded encryption, trust and cloud computing trends.

See also:
The [See the full post…]

Download Audio FileListen/download audio  

Categories: Cloud Computing, Intel, Intel Chip Chat, Security Tags: , , , , , , , ,

Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

November 9th, 2010 |
Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time.

See also:
IT Center
Open Port [See the full post…]

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Live from IDF: Gelsinger Puts Nehalem and Virtualization on Display

September 18th, 2007 |
Live from IDF: Gelsinger Puts Nehalem and Virtualization on Display

In his keynote today at the Intel Developer Forum in San Francisco, Patrick Gelsinger, senior vice president and general manager of Intel’s Digital Enterprise Group, gave a broad update on Intel’s efforts this year.

In this podcast, Gelsinger covers what [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, Information Technology, Intel, Intel Developer Forum, Intel IT, Intel Nehalem, IT@Intel Tags: , , , , , , , , , , , , , , ,

SNWSpotlight PM – Tuesday, April 17th, 2007

April 17th, 2007 |
SNWSpotlight PM – Tuesday, April 17th, 2007

SNW Spotlight is your source for the latest information from Storage Networking World, in San Diego.

In this edition of SNW Spotlight, storage in China, and security on your hard drive. Four Chinese journalists opine about what needs to happen [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, Corporate, SNWSpotlight Tags: , , , , , , , , ,