 |
“Why is Intel IT modernizing Windows client management? Because a large part of Intel IT’s job is managing client devices—175,000 end-user and shared PCs for 124,000 employees. We need to consider many factors. Does a PC have the right drivers [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel Tags: Cloud Native, cloud-first, efficiency, information security, Intel IT, IT Best Practices, IT Business Value, IT@Intel, modernizing windows client management, PC management, technical debt, user experience, UX
 |
IT Best Practices: Intel IT is building a multi-cloud-ready enterprise network that can meet Intel’s constantly-changing network requirements. Increasing adoption of public cloud services, enormous data and network bandwidth demand growth, an increasingly complex cybersecurity landscape, and new business [See the full post…] |
Read/Download PDF
|
|
Categories: Cloud Computing, data centers, Intel, Intel IT, IT White Papers, IT@Intel Tags: Cloud Services, Cybersecurity, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, multi-cloud, multi-cloud enterprise network, pdf, private cloud, Public Cloud, scaling the WAN, SDN, Software Defined Networking, Wide Area Network
 |
IT Best Practices: Construction of smart buildings at scale isn’t easy. For decades, enterprises have included smart technologies in their buildings to gain operational efficiencies, save maintenance costs, and make their offices more user-friendly. While these companies may have [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel Tags: design thinking, information security, information technology, Intel, Intel IT, Internet of Things, IoT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, PTK1, smart building design, smart buildings at scale, System of Systems, user experience
 |
IT Best Practices: Intel IT is improving Intel’s security posture with data intelligence–deploying a new Cyber Intelligence Platform (CIP) based on leading-edge technologies, including Splunk Enterprise and Apache Kafka. The new platform ingests data from hundreds of sources and [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: AI, artificial intelligence, cyber intelligence platform, Cybersecurity, Improving security posture with data intelligence, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, machine learning, pdf
 |
IT@Intel Brief: Learn how Intel IT is protecting the enterprise against advanced persistent threats (APTs), using machine learning with pattern analysis and other advanced cybersecurity techniques such as honeypots, sinkholes, and Layer 7 monitoring. [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: advanced persistent threat, APT, APTs, Cybersecurity, honeypots, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Layer 7 monitoring, machine learning, pdf, sinkholes
 |
IT Best Practices: Intel IT’s SIEM architecture is based on three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes almost 4 billion events per day to deliver near real-time trends and reporting.
See [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Big Data, cyber security, Enterprise Security, information security, information technology, Insider Threats, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, SEIM
 |
IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. [See the full post…] |
Watch/download video
|
|
Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, privacy, privacy principles, protect to enable, Security
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
Categories: Corporate, Featured, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: data security, governance, information security, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Malcolm Harkins, privacy, privacy principles, protect to enable
 |
IT Best Practices: To make it easier for employees to use small form factor devices to accomplish job duties, Intel IT is developing an enhanced connectivity solution. This solution will help broaden the range of applications available to managed [See the full post…] |
Read/Download PDF
|
|
Categories: Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: information security, Intel, Intel IT, IT Best Practices, IT Business Value, IT Consumerization, IT Whitepaper, IT@Intel, Smartphones
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Computing, Cloud Computing Security, Cyber Risk Management, Data Anonymization, information security, Intel IT, IT Best Practices, IT@Intel
Categories: Big Data, Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology Tags: Alan Ross, Big Data, Cyber Risk Management, cyber security, Enterprise Security, information security, Insider Threats, IT Best Practices, IT@Intel, Security Business Intelligence, SIEM
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Computing, Cloud Computing Security, Cyber Risk Management, Data Anonymization, information security, Intel IT, IT Best Practices, IT@Intel
 |
IT Best Practices: Intel IT is exploring data anonymization—the process of obscuring published data to prevent the identification of key information—in support of our vision of a hybrid cloud computing model and our need to protect the privacy of [See the full post…] |
Read/Download PDF
|
|
Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security, Technology Tags: Cloud Computing, Cloud Computing Security, Cyber Risk Management, Data Anonymization, information security, Intel IT, IT Best Practices, IT@Intel
 |
IT Best Practices: Intel IT has conducted a successful pilot project of our hardware-based whole-disk encryption (WDE) solution to replace our current software-based WDE solution on systems with self-encrypting drives. Compared to software-based WDE, our new hardware-based WDE solution [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, Intel vPro, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, encryption, information security, Intel IT, Intel vPro Technology, IT Best Practices, IT@Intel, Solid State Drives, SSD
 |
IT Best Practices: Increasingly, healthcare organizations are realizing the value of risk assessments as much more than a regulatory or compliance checkbox. Risk assessments also bring a targeted and measured approach to privacy and security. Risks can be mitigated [See the full post…] |
Read/Download PDF
|
|
Categories: Healthcare, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Cyber Risk Management, Healthcare, Healthcare IT, information security, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, risk management
Categories: HD Video, Intel, Intel IT, IT@Intel, Video Podcast Tags: Cyber Risk Management, Enterprise Security, information security, IntelIT, IT Best Practices, IT@Intel, protect to enable
 |
IT Best Practices: Intel IT created a High Trust Zone (HTZ) architecture to virtualize high-security servers. By identifying and classifying risks, we developed controls to mitigate the risks of moving sensitive information and applications to our private cloud.
[See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cloud Computing, Cloud Server, Cyber Risk Management, Data Center Solutions, Enterprise Security, High Trust Zone, high-security servers, HTZ, information security, Intel IT, IT Best Practices, IT@Intel, private cloud, virtualization
 |
IT Best Practices: Intel IT finance created a new information security investment model which allows IT management, financial experts and security professionals to analyze and prioritize investments, based on risk mitigation against a variety of security threats. A key [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Cyber Risk Management, Enterprise Security, information security, Intel IT, IT Best Practices, IT Investment, IT@Intel, Risk assessment
 |
IT Best Practices: The IT@Intel program connects IT professionals around the world with their IT peers inside our organization – sharing lessons learned, methods and strategies. Our goal is simple: Share the Intel IT best practices that create business [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: business, business intelligence, collaboration, Cyber Risk Management, data center, employee, financial valuation, information security, Intel IT, IT Best Practices, IT Business Value, IT Competitive Advantage, IT Sustainability, IT@Intel, productivity, Server Refresh, social media, strategic planning, sustainability
Categories: Cloud Computing, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security, Technology, Video Podcast Tags: Cloud Computing, Cyber Risk Management, information security, Intel IT, IT Best Practices, IT Business Value, Malcolm Harkins
Categories: Information Technology, Intel, Intel IT, IT@Intel, Research@Intel, Security, social media, Video Podcast Tags: Cyber Risk Management, information security, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins, Social Computing, social media, Technology
Categories: Cloud Computing, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Enterprise Security, information security, Intel IT, IT Best Practices, IT Business Value, IT Consumerization
Categories: Corporate, HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: CISO, Cyber Risk Management, information security, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins
Categories: HD Video, Information Technology, Intel, Intel IT, IT@Intel, Security Tags: CISO, Cyber Risk Management, Enterprise Security management, information security, Intel IT, IT Best Practices, IT Business Value, Malcolm Harkins