|
Transforming Storage – Episode 2 – The practices of data security professionals require the latest technologies and an understanding of human nature. Talk to anyone in security and they readily recount stories of breaches that were accomplished not with sophisticated [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Security, Technology, Transforming Storage Tags: Cloud Security, data security, Eric Carpenter, Jay Kim, networking, Scott Durant, Security, storage
Categories: Inside IT, Intel, Intel IT, IT@Intel Tags: Audio Podcast, Brian Willis, Corporate, cyber-threat, GDI, global digital infrastructure, information technology, innovation, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Security
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, biometrics, Cloud Computing, Corporate, EyeVerify, information technology, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Larry Ponemon, Malcolm Harkins, Ponemon Institute, Security, Toby Rush
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: Allied Digital, Business Solutions for IT Managers, Healthcare IT, Intel, Intel vPro, IT Best Practices, IT Business Value, IT Whitepaper, LANDesk Management Suite, pdf, Security
Categories: Business Solutions for IT Managers, Cloud Computing, Information Technology, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cloud Computing, Cloud Services, CompatibleOne, Intel, Intel Trusted Execution Technology, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security
Categories: Audio Podcast, Cloud Computing, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Cloud Computing, consumerization, enterprise architecture, Granular Trust Model, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT White Papers, IT@Intel, Security, Toby Kohlenberg
|
IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: BI, business intelligence, Chief Information Security Officer, CISO, CRM, enterprise architecture, information technology, Intel, Intel IT, IT Best Practices, IT Business Value, IT security, IT White Papers, IT@Intel, Malcolm Harkins, Security, Stacy Purcell
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security, Technology Tags: Advanced Encryption Standard New Instructions, AES-NI, Business Solutions for IT Managers, decryption, DuPont, encryption, high performance computing, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security
Categories: Big Data, Cloud Computing, Corporate, HD Video, Information Technology, Intel, Intel: Intelligent Storage, Intel: Software Defined Infrastructure, Video Podcast Tags: Big Data, cloud, Cloud Computing, Data Protection, Enterprise storage, Intel, Intel: Intelligent Storage, scale out storage, Security, Xeon, Xeon Processors
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Chief Information Security Officer, CISO, Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: Big Data, Cloud Computing, consumerization of IT, Intel, Intel IT, Intel IT Annual Performance Report, Intel IT Performance Report, IT Best Practices, IT Business Value, IT Consumerization, IT@Intel, Kim Stevenson, Security, Smartphones, Social Computing, tablets, Ultrabook
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Cyber Risk Management, Information Technology Group, IT Best Practices, IT Business Value, Malcolm Harkins, privacy, risk, Security, social media
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat, Intel Developer Forum Tags: Allyson Klein, Big Data, Billy Cox, Chip Chat, Cloud Builders, Cloud Computing, Cloud Finder, data center, efficiency, Intel, manageability, podcast, Security
Categories: Business Solutions for IT Managers, Information Technology, Intel, IT White Papers, Security Tags: AFRL, Air Force Research Laboratory, Business Solutions for IT Managers, Citrix, Collaboration for Government Users, Cyber Risk Management, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security
Categories: Audio Podcast, Cloud Computing, Intel, Intel Chip Chat Tags: Allyson Klein, Chip Chat, Cloud Computing, data center, Intel, ODCA, Open Data Center Alliance, podcast, Robert Rounsavall, Security, Trapezoid
Categories: Big Data, Business Solutions for IT Managers, Cloud Computing, Corporate, data centers, Information Technology, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cyber Risk Management, Intel, IT Best Practices, IT Business Value, IT Whitepaper, pdf, Security, Swiss Mobiliar
Categories: Business Solutions for IT Managers, Cloud Computing, data centers, HPE - Hewlett Packard Enterprise, Intel, IT White Papers, Security Tags: Aria Systems, blade servers, Business Solutions for IT Managers, Cloud Computing, Cyber Risk Management, data centers, Hewlett-Packard, HP, HP ProLiant, HPE, Intel, Intel Xeon processor E5, IT Best Practices, IT Business Value, IT Whitepaper, pdf, scalability, Security
Categories: Audio Podcast, Cloud Computing, data centers, Intel, Intel Conversations in the Cloud, Security, Technology Tags: Allyson Klein, Cloud Computing, Conversations in the Cloud, Cyber Risk Management, Intel, Jose Gonzalez, National Australia Bank, ODCA, Open Data Center Alliance, Robert Rounsavall, Security, Terremark, Trapezoid, Trapezoid Data Intelligence
Categories: Business Solutions for IT Managers, Healthcare, Intel, IT White Papers, Security Tags: Business Solutions for IT Managers, Cyber Risk Management, Health Services, Healthcare IT, Intel, Intel core vPro, IT Best Practices, IT Business Value, IT Whitepaper, Netown Corporation, pdf, Security, telehealth services
Categories: HD Video, Intel, Intel Labs, Research@Intel, Research@Intel Archive, Video Podcast Tags: Displays, dynamic displays, Intel, Intel Labs, Life Without Keys, Passwords, Research, research@intel 2012, Security
Categories: Audio Podcast, Big Data, Intel, Intel Conversations in the Cloud, Security Tags: Cloud Builders, Cloud Computing, compliance, Conversations in the Cloud, Cyber Risk Management, Identity Management, Intel, malware, McAfee, podcast, Security, Tim Roddy
Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, virtualization Tags: Audio Podcast, Corporate, information technology, Inside IT, Intel, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel, Security, Toby Kohlenberg, virtual environment, virtual servers
|
As services and data move to the cloud, Intel IT has found that the end–point device is not only retaining its relevancy, but is also becoming even more important. This belief runs contrary to the industry assumption that the abstraction [See the full post…] |
Read/Download PDF
|
|
Categories: Cloud Computing, Corporate, Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: cloud-based services, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, pdf, Security
Categories: Audio Podcast, data centers, Security, Tech Conferences and Events, Technology Tags: Best of Interop, Cyber Risk Management, Interop, Interop 2012, Interop 2012 Las Vegas, Interop Las Vegas, McAfee, Security, Tyler Carter
Categories: Audio Podcast, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Audio Podcast, B.I., Big Data, Corporate, Cyber Risk Management, Grant Babb, information technology, Inside IT, Insider Threats, Intel, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel, Security