Security tagged posts:

IT Best Practices: Rethink Privacy

IT Best Practices: Rethink Privacy

IT Best Practices: Consumers care about privacy, is your company or organization paying attention? This video shows why companies and organizations should incorporate privacy early in their design, development, and deployment process – whether they’re working on products, programs or [See the full post…]

Download Video FileWatch/download video  

SAND ART: It’s your baby, Protect it!

September 25th, 2013 |
SAND ART: It’s your baby, Protect it!

Beautiful sand artistry, by Shubhada Sahasrabudhe comparing the creation of technology with the development of a child and the importance of protecting both. For more information, see: intel.com/TMI

Download Video FileWatch/download video  

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Sharing Cyber-Threat Information

July 9th, 2013 |
Inside IT: Sharing Cyber-Threat Information

IT Best Practices: Episode 53 – Information technology is no longer simply an isolated set of machines and tools used on a narrow set of tasks. The Global Digital Infrastructure, or GDI, is a worldwide network of devices and services [See the full post…]

Download Audio FileListen/download audio  

Inside IT: RSA 2013

May 14th, 2013 |
Inside IT: RSA 2013

IT Best Practices: Episode 50 – The RSA Conference in San Francisco earlier this year. It was an opportunity to check in with a few attendees, and to take the pulse of the security industry. In this podcast we hear [See the full post…]

Download Audio FileListen/download audio  

Allied Digital: Network Security, Fewer House Calls

Allied Digital: Network Security, Fewer House Calls

Business Solutions for IT Managers: Allied Digital simplifies IT at a student health center with Intel vPro technology and LANDesk Management Suite.

Download PDFRead/Download PDF  

CompatibleOne: Making the Cloud More Transparent

CompatibleOne: Making the Cloud More Transparent

Business Solutions for IT Managers: CompatibleOne collaborates with Intel to develop automated cloud brokerage service using Intel Trusted Execution Technology to boost confidence in the security of cloud services.

Download PDFRead/Download PDF  

Inside IT: Balancing Security and a Great User Experience

April 2nd, 2013 |
Inside IT: Balancing Security and a Great User Experience

IT Best Practices: Episode 47 – Intel has implemented a new granular trust model to improve security throughout the enterprise. It’s designed to support key initiatives like IT consumerization and cloud computing. At the same time Intel wants to keep [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big component [See the full post…]

Download Audio FileListen/download audio  

DuPont Increases Security with Intel-Based Encryption

February 18th, 2013 |
DuPont Increases Security with Intel-Based Encryption

Business Solutions for IT Managers: IT engineers from DuPont and Intel see performance improvements of up to 300 percent in encryption and decryption.

Download PDFRead/Download PDF  

Intel Scale-Out Storage Technologies: Powering Tomorrow’s Cloud

February 11th, 2013 |
Intel Scale-Out Storage Technologies: Powering Tomorrow’s Cloud

Intelligent Storage: Smarter storage based on Intel Xeon processors lets you more easily scale your enterprise storage, providing added data protection and security, all while staying within your storage budget.

Download Video FileWatch/download video  

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |
IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins As the technology environment continues to evolve, many people believe we’re moving toward a future in which organizations outsource much of the delivery [See the full post…]

Download PDFRead/Download PDF  

2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

February 5th, 2013 |
2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

IT Business Value: Learn about Intel IT’s strategies and initiatives that are accelerating Intel’s business growth in the 2012-13 Intel IT Annual Performance Report. Learn how Intel IT is delivering business value through big data, cloud computing, consumerization of IT, [See the full post…]

Download PDFRead/Download PDF  

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |
IT Best Practices: Protecting the Perimeter

IT Best Practices: From the book “Managing Risk and Information Security: Protect to Enable” by Malcolm Harkins At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media [See the full post…]

Download PDFRead/Download PDF  

Live from IDF – Intel Cloud Programs – Intel Chip Chat – Episode 211

December 15th, 2012 |
Live from IDF – Intel Cloud Programs – Intel Chip Chat – Episode 211

In this Intel Chip Chat audio podcast with Allyson Klein: Billy Cox, a director in the Datacenter Software Division of Intel, stops by to talk about Intel Cloud Builders and Intel Cloud Finders. Cloud Builders launched more than two years [See the full post…]

Download Audio FileListen/download audio  

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

December 9th, 2012 |
Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

Business Solutions for IT Managers: Air Force Research Laboratory (AFRL) teams with Intel and Citrix to increase client security while saving millions of dollars annually.

Download PDFRead/Download PDF  

Live from the ODCA Summit with Trapezoid – Intel Chip Chat – Episode 208

December 9th, 2012 |
Live from the ODCA Summit with Trapezoid – Intel Chip Chat – Episode 208

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive from a livecast, Robert Rounsavall, the CEO of Trapezoid, stops by to talk about hardware root of trust and security at the lowest levels of the stack. [See the full post…]

Download Audio FileListen/download audio  

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

November 27th, 2012 |
Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

Business Solutions for IT Managers: Swiss Mobiliar: Intel Core i7 processors offer improved performance, connectivity, security and lighter devices.

Download PDFRead/Download PDF  

Aria Systems: Providing the Foundation for an Expanding Cloud

September 20th, 2012 |
Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing [See the full post…]

Download PDFRead/Download PDF  

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

September 7th, 2012 |
Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Robert Rounsavall and Jose Gonzalez from Trapezoid discuss the company’s products – Trapezoid Data Intelligence – in the areas of hardware trust and security that allow moving into [See the full post…]

Download Audio FileListen/download audio  

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

September 6th, 2012 |
Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

Business Solutions for IT Managers: With Intel Core vPro processors, Netown Corporation can provide high-quality telehealth services that offer efficiency, security, and quick response for its elderly and chronic disease patients.

Download PDFRead/Download PDF  

Research@Intel 2012 Dynamic Surfaces and Life Without Keys

June 27th, 2012 |
Research@Intel 2012 Dynamic Surfaces and Life Without Keys

Research@Intel 2012: Experience a couple of ways daily life could be in the future. With dynamic displays any surface in a home or workplace could turn into a screen to display on and interact with. Life Without Keys is a [See the full post…]

Download Video FileWatch/download video  

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Tim Roddy, Sr. Director Product Marketing from McAfee, chats about some of the biggest security concerns when moving data and applications to the cloud including malware, compliance issues, [See the full post…]

Download Audio FileListen/download audio  

Inside IT: Virtualizing High-Security Servers

May 22nd, 2012 |
Inside IT: Virtualizing High-Security Servers

IT Best Practices: Episode 25 – Intel is a large operation, with ninety thousand employees and an equal number of servers. Like a lot of organizations, Intel has been virtualizing servers over time to increase utilization and efficiency, and to [See the full post…]

Download Audio FileListen/download audio  

Why the Device Matters in a Cloud-centric World

Why the Device Matters in a Cloud-centric World

As services and data move to the cloud, Intel IT has found that the end–point device is not only retaining its relevancy, but is also becoming even more important. This belief runs contrary to the industry assumption that the abstraction [See the full post…]

Download PDFRead/Download PDF