Security tagged posts:

Transforming Storage: Intelligent Storage, Secure Data

September 3rd, 2013 |
Transforming Storage: Intelligent Storage, Secure Data

Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: , , , , , , ,

Inside IT: Sharing Cyber-Threat Information

July 9th, 2013 |
Inside IT: Sharing Cyber-Threat Information

IT Best Practices: Episode 53 – Information technology is no longer simply an isolated set of machines and tools used on a narrow set of tasks. The Global Digital Infrastructure, or GDI, is a worldwide network of devices and [See the full post…]

Download Audio FileListen/download audio  

Categories: Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , ,

Inside IT: RSA 2013

May 14th, 2013 |

Allied Digital: Network Security, Fewer House Calls

CompatibleOne: Making the Cloud More Transparent

Inside IT: Balancing Security and a Great User Experience

April 2nd, 2013 |
Inside IT: Balancing Security and a Great User Experience

IT Best Practices: Episode 47 – Intel has implemented a new granular trust model to improve security throughout the enterprise. It’s designed to support key initiatives like IT consumerization and cloud computing. At the same time Intel wants to [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , ,

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

DuPont Increases Security with Intel-Based Encryption

February 18th, 2013 |

Intel Scale-Out Storage Technologies: Powering Tomorrow’s Cloud

February 11th, 2013 |
Intel Scale-Out Storage Technologies: Powering Tomorrow’s Cloud

Intelligent Storage: Smarter storage based on Intel Xeon processors lets you more easily scale your enterprise storage, providing added data protection and security, all while staying within your storage budget. [See the full post…]

Download Video FileWatch/download video  

Categories: Big Data, Cloud Computing, Corporate, HD Video, Information Technology, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Video Podcast Tags: , , , , , , , , , ,

IT Best Practices: The 21st Century CISO (Chief Information Security Officer)

February 6th, 2013 |

2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

February 5th, 2013 |
2012-2013 Intel IT Annual Report: Accelerating Business Growth Through IT

IT Business Value: Learn about Intel IT’s strategies and initiatives that are accelerating Intel’s business growth in the 2012-13 Intel IT Annual Performance Report. Learn how Intel IT is delivering business value through big data, cloud computing, [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: Protecting the Perimeter

January 14th, 2013 |

Live from IDF – Intel Cloud Programs – Intel Chip Chat – Episode 211

December 15th, 2012 |
Live from IDF – Intel Cloud Programs – Intel Chip Chat – Episode 211

In this Intel Chip Chat audio podcast with Allyson Klein: Billy Cox, a director in the Datacenter Software Division of Intel, stops by to talk about Intel Cloud Builders and Intel Cloud Finders. Cloud Builders launched more than two [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Developer Forum Tags: , , , , , , , , , , , ,

Air Force Research Laboratory: Improving Security, Costs, and Collaboration for Government Users

December 9th, 2012 |

Live from the ODCA Summit with Trapezoid – Intel Chip Chat – Episode 208

December 9th, 2012 |
Live from the ODCA Summit with Trapezoid – Intel Chip Chat – Episode 208

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive from a livecast, Robert Rounsavall, the CEO of Trapezoid, stops by to talk about hardware root of trust and security at the lowest levels of the [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat Tags: , , , , , , , , , ,

Swiss Mobiliar: Choosing Intel Core i7 Processors to Boost Endpoint Efficiency

November 27th, 2012 |

Aria Systems: Providing the Foundation for an Expanding Cloud

September 20th, 2012 |
Aria Systems: Providing the Foundation for an Expanding Cloud

Business Solutions for IT Managers: Aria Systems selects the Intel Xeon processor E5 family to deliver the performance, scalability, security, and availability needed for its cloud-based subscription billing solution. To accommodate the tremendous customer demand for its cloud-based subscription billing [See the full post…]

Download PDFRead/Download PDF  

Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HPE - Hewlett Packard Enterprise, Intel, IT White Papers, Security Tags: , , , , , , , , , , , , , , , , ,

Hardware Root of Trust with Trapezoid – Intel Conversations in the Cloud – Episode 49

September 7th, 2012 |

Netown Corporation: Harnessing Technologies to bring Efficient, Secure, and High-Performing Health Care Services

September 6th, 2012 |

Research@Intel 2012 Dynamic Surfaces and Life Without Keys

June 27th, 2012 |
Research@Intel 2012 Dynamic Surfaces and Life Without Keys

Research@Intel 2012: Experience a couple of ways daily life could be in the future. With dynamic displays any surface in a home or workplace could turn into a screen to display on and interact with. Life Without Keys is [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Intel, Intel Labs, Research@Intel, Research@Intel Archive, Video Podcast Tags: , , , , , , , ,

McAfee and Cloud Security – Intel Conversations in the Cloud – Episode 44

Inside IT: Virtualizing High-Security Servers

May 22nd, 2012 |
Inside IT: Virtualizing High-Security Servers

IT Best Practices: Episode 25 – Intel is a large operation, with ninety thousand employees and an equal number of servers. Like a lot of organizations, Intel has been virtualizing servers over time to increase utilization and efficiency, and [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, virtualization Tags: , , , , , , , , , , , , ,

Why the Device Matters in a Cloud-centric World

Why the Device Matters in a Cloud-centric World

As services and data move to the cloud, Intel IT has found that the end–point device is not only retaining its relevancy, but is also becoming even more important. This belief runs contrary to the industry assumption that the abstraction [See the full post…]

Download PDFRead/Download PDF  

Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , , ,

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

Interop 2012: McAfee’s Tyler Carter Talks About Interoperability, Complexity and Security

If the growing IT complexity in many enterprises helps to foster employee creativity, collaboration and productivity, then security pros want to enable and not limit the diversity of apps, platforms and hardware. That’s the message from McAfee’s Tyler Carter at [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, data centers, Security, Tech Conferences and Events, Technology Tags: , , , , , , , ,

Inside IT: Mitigating Insider Threats

May 7th, 2012 |
Inside IT: Mitigating Insider Threats

IT Best Practices: Episode 24 – Employee theft is not a new problem. It does, however, have new dimensions to it in this era of data sophistication. And insider incidents have taken on new prominence in the public consciousness [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , , , , , ,