Enterprise Security tagged posts:

Insider Threat Field Guide

October 21st, 2015 |
Insider Threat Field Guide

IT Best Practices: One of the most serious security challenges facing enterprises today is that of insider threat. However, many enterprises do not fully understand the scope of the problem and until recently, there has been a lack of tools [See the full post…]

Download PDFRead/Download PDF  

Taking enterprise security beyond the edge

October 20th, 2015 |
Taking enterprise security beyond the edge

IT Best Practices: Intel IT is developing a beyond-the-edge security strategy that will enhance security in our environment. This new strategy addresses several drawbacks with today’s approach to security.

Download PDFRead/Download PDF  

SIEM – Intel IT’s Security Business Intelligence Architecture

September 16th, 2014 |
SIEM – Intel IT’s Security Business Intelligence Architecture

IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting. See also: [See the full post…]

Download PDFRead/Download PDF  

IT Business Review: Striking a balance between protection and enablement

February 10th, 2014 |
IT Business Review: Striking a balance between protection and enablement

IT Best Practices: Information security has traditionally revolved around keeping the “good guys” in and the “bad guys” out. Taking a page from the medieval playbook, security professionals have tirelessly built higher virtual walls, deeper digital moats, and more capable [See the full post…]

Download PDFRead/Download PDF  

COMGUARD: Expanding its Portfolio

COMGUARD: Expanding its Portfolio

Business Solutions for IT Managers: Value-add IT distributor COMGUARD continuously seeks to broaden the enterprise security services it offers to customers. This is essential to remain competitive within its market segment. Together with Intel, COMGUARD set up a demonstration suite [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Improving Data Protection with McAfee Drive Encryption

December 4th, 2013 |
IT Best Practices: Improving Data Protection with McAfee Drive Encryption

IT Best Practices: Intel IT is replacing our previous software-based encryption solution with McAfee Drive Encryption, an integral component of new McAfee security products such as McAfee Complete Data Protection – Advanced software. This high-performing, reliable solution provides integrated manageability, [See the full post…]

Download PDFRead/Download PDF  

Android Devices in a BYOD Environment

November 7th, 2013 |
Android Devices in a BYOD Environment

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google [See the full post…]

Download PDFRead/Download PDF  

Granular Trust Model – Improving Enterprise Security

November 30th, 2012 |
Granular Trust Model – Improving Enterprise Security

IT Best Practices: Intel IT has completed a pilot of its granular trust model, designed to support key initiatives such as IT consumerization and cloud computing. This trust model provides dynamic security controls and user access to reduce enterprise risk [See the full post…]

Download PDFRead/Download PDF  

SIEM – Intel IT’s Security Business Intelligence Architecture

November 13th, 2012 |
SIEM – Intel IT’s Security Business Intelligence Architecture

SIEM architecture – Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.

Download Video FileWatch/download video  

Intel IT Annual Report: 2012 Mid-Year Update

September 17th, 2012 |
Intel IT Annual Report: 2012 Mid-Year Update

Intel IT Annual Report: 2012 mid-year update that shares progress on key strategic initiatives that delivered business value to Intel — cloud computing, IT consumerization, business intelligence, social computing and enterprise security.

Download PDFRead/Download PDF  

Evaluating Ultrabook Devices for the Enterprise

Evaluating Ultrabook Devices for the Enterprise

IT Best Practices: Intel IT is proactively gathering data about Ultrabook devices and how they fit into the enterprise, in anticipation of a wave of new devices and form factors, and the associated expectations from employees who want to buy [See the full post…]

Download PDFRead/Download PDF  

Intel IT – Protect to Enable

February 8th, 2012 |
Intel IT – Protect to Enable

Learn about Intel’s IT best practices and our new information security strategy…. a new architecture that is designed to increase productivity, agility and innovation, while actually decreasing risk.

Download Video FileWatch/download video  

IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

January 30th, 2012 |
IT Best Practices: Virtualizing High-Security Servers in a Private Cloud

IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.  

Download PDFRead/Download PDF  

Measuring the Value of Information Security Investments

January 30th, 2012 |
Measuring the Value of Information Security Investments

IT Best Practices: Intel IT finance created a new information security investment model which allows IT management, financial experts and security professionals to analyze and prioritize investments, based on risk mitigation against a variety of security threats. A key strength [See the full post…]

Download PDFRead/Download PDF  

JUST RELEASED! 2011-2012 Intel IT Performance Report

January 25th, 2012 |
JUST RELEASED!  2011-2012 Intel IT Performance Report

IT Best Practices: Explore Intel IT’s strategies and actions that created business value for Intel in 2011, as well as their key focus areas for 2012, in the 11th edition of the Intel IT Performance Report. Key topics include IT [See the full post…]

Download PDFRead/Download PDF  

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature of [See the full post…]

Download Audio FileListen/download audio  

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: Information Security should Protect and Enable

Intel IT Best Practices: At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role [See the full post…]

Download PDFRead/Download PDF  

Securing Intel’s External Online Presence

Securing Intel’s External Online Presence

To protect Intel and its customers, Intel IT established a program that assesses, monitors, and enforces the security, privacy, and regulatory compliance of externally facing Intel-branded Web sites and online marketing programs.

Download PDFRead/Download PDF  

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month evaluation of [See the full post…]

Download PDFRead/Download PDF  

vPro Technology: Security Use Cases

April 2nd, 2009 |
vPro Technology: Security Use Cases

Although the latest virus scare has yet to materialize into an attack — security experts tell us that Conficker, as of April 1, 2009, remains dormant — it puts a exclamation point on the notion that IT departments need clear [See the full post…]

Download Video FileWatch/download video  

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 4

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 4

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Results of the Participant Survey) This is Part Four of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, [See the full post…]

Download Video FileWatch/download video  

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 3

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 3

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (The Blueprint in Various Industries) This is Part Three of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, [See the full post…]

Download Video FileWatch/download video  

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 2

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 2

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Operational and Strategic Elements of the Blueprint) This is Part Two of the second episode of the The “Building Confidence in Enterprise Security” video [See the full post…]

Download Video FileWatch/download video  

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 1

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint. This is Part One of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, featuring Samir Kapuria and Andre [See the full post…]

Download Video FileWatch/download video  

Data Loss Prevention

Data Loss Prevention

Symantec Group Product Manager Lee Weiner provides an overview of data loss prevention and how companies can work to keep valuable information within their organizations. For more information, visit the Enterprise Security section at: www.symantec.com

Download Audio FileListen/download audio