IT security tagged posts:

Securing the WAN Edge – Intel Chip Chat Network Insights – Episode 217

Securing the WAN Edge – Intel Chip Chat Network Insights – Episode 217

Intel Chip Chat – Network Insights audio podcast with Allyson Klein: As enterprises migrate business critical applications out to the edge of the network and to multi-cloud platforms, and seek to accelerate delivery of SaaS apps across edge/cloud nodes, [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Chip Chat, Intel Chip Chat: Network Insights Tags: , , , , , , , , , , , , ,

Cloud Security: An Introduction to Microsoft Azure Information Protection

Cloud Security: An Introduction to Microsoft Azure Information Protection

Microsoft Azure Information Protection is a new solution that makes it simpler to classify and protect information, even as it travels outside of your organization.

You’ll see the new options that let you define how your users can classify their [See the full post…]

Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Information Technology, Microsoft, Microsoft Mechanics, Security, Video Podcast Tags: , , , , , , ,

Oracle: Announcing the SPARC Platform

Oracle: Announcing the SPARC Platform

Highlights of John Fowler, Oracle Executive Vice President of Systems, announcing major new additions to the SPARC platform that for the first time bring the advanced security, efficiency, and simplicity of SPARC to the cloud.

For more information see: [See the full post…]

Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Oracle, Security, Video Podcast Tags: , , , , , , ,

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this [See the full post…]

Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , ,

Inside IT: User-Centered IT

March 19th, 2013 |
Inside IT: User-Centered IT

IT Best Practices: Episode 46 – IT has developed a new partnership with its users over the past few years. Changes in technology, and the needs and demands of employees, have created new flexibility and greater choice for workers. [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , ,

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Microsoft Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

November 26th, 2010 |
IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

IT Best Practices: Intel IT is actively integrating employee-owned hand-held devices into our enterprise environment. With safeguards in place to protect data and intellectual property, we are allowing employees to select the tools that suit their personal work styles [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

IT Security in the Data Center – Intel Chip Chat – Episode 109

November 24th, 2010 |
IT Security in the Data Center – Intel Chip Chat – Episode 109

In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson from Intel discusses the importance of data center security, the technologies that improve security from the microprocessor level and end users’ responses to the technologies.

Intel Server [See the full post…]

Download Audio FileListen/download audio  

Categories: Intel, Intel Chip Chat Tags: , , , , , ,

Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

November 9th, 2010 |
Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time.

See also:
IT Center
Open Port [See the full post…]

Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Evaluating Thin-Client IT Security in a Changing Threat Landscape

September 19th, 2010 |
Evaluating Thin-Client IT Security in a Changing Threat Landscape

IT Client Technology: Intel IT’s security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Recent cyber-attacks on a number of high-profile targets provided added impetus to re-evaluate [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , ,

Alan Ross: IT Information Security Starts At Home

July 29th, 2010 |
Alan Ross: IT Information Security Starts At Home

IT Information Security: “We cannot solve security problems with technology.” That is one of the observations of Intel IT’s Alan Ross, a Senior Principal Engineer who has developed deep insights into the data security landscape over the past decade. [See the full post…]

Download Video FileWatch/download video  

Categories: Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

PodTech Weekly

November 18th, 2006 |
PodTech Weekly

SAN FRANCISCO, November 18, 2006 (PodTech News) — This week saw the highly-anticipated launch of the new Sony Playstation 3. The first few buyers to get their hands on the new system waited for about 40 hours outside of the [See the full post…]

Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Technology Tags: , , ,