Security tagged posts:

CompuCom: Simplifying IT Management and Improving the User Experience with Intel

February 13th, 2015 |
CompuCom: Simplifying IT Management and Improving the User Experience with Intel

Business Solutions for IT Managers: CompuCom saves its clients the cost of sending out technicians and cuts downtime while getting rid of wires and boosting security with 5th generation Intel Core vPro processors.

Download Video FileWatch/download video  

Bringing Security to the Cloud – Intel Chip Chat – Episode 355

Bringing Security to the Cloud – Intel Chip Chat – Episode 355

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from the Intel Developer Forum, Jim Comfort, the GM of Cloud Services in the Global Technology Services Unit at IBM and Karna Bojjireddy, Lead [See the full post…]

Download Audio FileListen/download audio  

Network Security Challenges and Solutions – Intel Chip Chat – Episode 329

Network Security Challenges and Solutions – Intel Chip Chat – Episode 329

In this Intel Chip Chat audio podcast with Allyson Klein:Bikram Gupta, a Senior Product Manager at Intel, stops by to talk about the Intel Security suite of solutions including PC/mobile phone, security management, firewall and network security. With the move [See the full post…]

Download Audio FileListen/download audio  

Big Data: Rethink Privacy

Big Data: Rethink Privacy

IT Best Practices: Big data and the technologies that enable it hold the promise to address societal problems, but we need to get privacy right. This video describes the importance of reinterpreting traditional principles of fair information practices in a [See the full post…]

Download Video FileWatch/download video  

Securing the Data Center – Intel Chip Chat – Episode 324

September 23rd, 2014 |
Securing the Data Center – Intel Chip Chat – Episode 324

In this Intel Chip Chat audio podcast with Allyson Klein: Jim Greene, a product marketing engineer focused on server security technologies at Intel, stops by to talk about his book: Intel Trusted Execution Technology for Server Platforms: A Guide to [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Faster Threat Detection with Security Business Intelligence

September 9th, 2014 |
Inside IT: Faster Threat Detection with Security Business Intelligence

IT Best Practices: Episode 83 – Cyber security in the enterprise has evolved because the threat landscape has changed so dramatically. That’s certainly true at Intel. Tony Saint, is Intel IT’s Cyber Security Operations Manager. Like all security specialists in [See the full post…]

Download Audio FileListen/download audio 6:08  

Inside IT: Developing Applications With Security Built-In

August 19th, 2014 |
Inside IT: Developing Applications With Security Built-In

IT Best Practices: Episode 82 – The use of mobile devices in the enterprise – and everywhere for that matter – has increased dramatically over the past several years. This is as true at Intel as anywhere. As the use [See the full post…]

Download Audio FileListen/download audio 7:52  

Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Inside IT: Intel’s Identity and Access Management Program

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want to [See the full post…]

Download Audio FileListen/download audio 8:58  

Intel and Atos: The Evolution of the Enterprise Client Experience

Intel and Atos: The Evolution of the Enterprise Client Experience

Business Solutions for IT Managers: With Ultrabook devices, Intel and Atos are helping address evolving enterprise needs and providing the performance, flexibility, and mobility employees expect plus the security, manageability, connectivity, and cost-effectiveness enterprises require.

Download PDFRead/Download PDF  

Inside IT: Intel’s SaaS Security Playbook

Inside IT: Intel’s SaaS Security Playbook

IT Best Practices: Episode 78 – The SMAC stack is changing the nature of business. SMAC is Social, Mobile, Analytics, and Cloud. Advances in these areas have allowed many operations in the enterprise to move to the cloud, and Software [See the full post…]

Download Audio FileListen/download audio  

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Unisys: Consolidated Infrastructure for Mission-Critical Apps

Business Solutions for IT Managers: Unisys chooses Intel Xeon processors to help its Forward! platform deliver predictable performance, scalability, and security.

Download PDFRead/Download PDF  

Inside IT: Making It Safe for Intel to Go Fast

May 26th, 2014 |
Inside IT: Making It Safe for Intel to Go Fast

IT Best Practices: Episode 76 – The technical and organizational landscape has changed dramatically in the past few years. Organizations have a wealth of new opportunities for greater employee productivity and operational efficiency. But these opportunities, combined with an increase [See the full post…]

Download Audio FileListen/download audio  

Security and Mobile Devices – Intel Chip Chat – Episode 303

Security and Mobile Devices – Intel Chip Chat – Episode 303

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast from a recent trip to Mobile World Congress, Lianne Caetano, the Director of Mobile Product Marketing for McAfee, stops by to talk about the [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Talking About Security by Design at RSA 2014

March 18th, 2014 |
Inside IT: Talking About Security by Design at RSA 2014

IT Best Practices: Episode 71 – The annual RSA security conference was held in San Francisco recently. It was a chance to get together with top officials from a couple of large enterprise security organizations and talk about security by [See the full post…]

Download Audio FileListen/download audio  

Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

February 13th, 2014 |
Live from HP Discover: The State of Enterprise Security – Intel Chip Chat – Episode 291

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive of a livecast, Loretta Nierat, a Group Product Marketing Manager at McAfee, stops by to talk about the current state of security. She gives a brief history [See the full post…]

Download Audio FileListen/download audio  

IT Best Practices: Landesbetrieb IT.NRW: Paperless Government

January 23rd, 2014 |
IT Best Practices: Landesbetrieb IT.NRW: Paperless Government

Business Solutions for IT Managers: Landesbetrieb IT.NRW is a pioneer in secure mobile computing with Intel Core i5 and i7 processors.

Download PDFRead/Download PDF  

Inside IT: A Principles-Based Approach to Privacy at Intel

Inside IT: A Principles-Based Approach to Privacy at Intel

IT Best Practices: Episode 66 – Technological advances in our connected world are pressing businesses to re-examine privacy policies everywhere. That’s certainly true at Intel, where Stuart Tyler is a Senior Privacy Analyst in the Intel Security and Privacy office. [See the full post…]

Download Audio FileListen/download audio  

Grove City College: Enhancing Academic Mobility

December 19th, 2013 |
Grove City College: Enhancing Academic Mobility

Business Solutions for IT Managers: Intel Core i7 vPro processors and Intel Solid-State Drives help Grove City College deliver strong tablet performance, flexibility, and security.

Download PDFRead/Download PDF  

IT Best Practices: You Are The Security Perimeter

December 17th, 2013 |
IT Best Practices: You Are The Security Perimeter

IT Best Practices: People are the Perimeter – In today’s mobile world, people are the new security perimeter. Organizations and companies, including their products, customers and employees, are exposed to increasing security threats – both in number and complexity. At [See the full post…]

Download Video FileWatch/download video  

Inside IT: McAfee Drive Encryption at Intel

November 12th, 2013 |
Inside IT: McAfee Drive Encryption at Intel

IT Best Practices: Episode 62 – In this podcast we look at Intel’s deployment of McAfee Drive Encryption at Intel. A major component of security in an enterprise is securing the data on all those computers out there. In the [See the full post…]

Download Audio FileListen/download audio  

Android Devices in a BYOD Environment

November 7th, 2013 |
Android Devices in a BYOD Environment

IT Best Practices: Intel IT continues to expand and strengthen our bring-your-own-device (BYOD) program offerings. As the variety of devices increases, so does our challenge to maintain security and eDiscovery while protecting employees’ privacy, their data, and the enterprise. Google [See the full post…]

Download PDFRead/Download PDF  

Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

November 6th, 2013 |
Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

Business Solutions for IT Managers: In Ultrabooks and Windows 8 Professional, Ceiba Solutions sees opportunities to enhance productivity, security, and innovation for lab scientists.

Download Video FileWatch/download video  

Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

October 29th, 2013 |
Inside IT: Malcolm Harkins – Business Velocity in the Changing Security Landscape

IT Best Practices: Episode 61 – In this podcast we engage in a wide-ranging discussion on business velocity, security, and privacy with Intel’s Malcolm Harkins. Harkins has a unique view from his position as the Chief Security and Privacy Officer [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Android Devices in the BYOD Environment

October 15th, 2013 |
Inside IT: Android Devices in the BYOD Environment

IT Best Practices: Episode 60 – We’ve talked about Intel’s Bring Your Own Device program in previous podcasts. Intel enables employees to use their own smart phones, tablets, and other devices for work. Of those, about half – 20,000 in [See the full post…]

Download Audio FileListen/download audio  

Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

October 15th, 2013 |
Ceiba Solutions: Touch-Enabled Applications for the Lab of the Future

Business Solutions for IT Managers: In Ultrabook devices and Windows 8 Professional, Ceiba Solutions sees opportunities to enhance productivity, security, and innovation for lab scientists.

Download PDFRead/Download PDF