Categories: Audio Podcast, Corporate, Dell, Intel, Intel Chip Chat Tags: Allyson Klein, Brian Payne, Chip Chat, datacenter, Dell, E5, efficiency, Intel, podcast, PowerEdge, Security, server, uptime, Xeon
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: Allyson Klein, Chip Chat, Christopher MacGowan, Cloud Builders, Cloud Computing, data center, E5, enterprise, Intel, OpenStack, Piston Cloud Computing, podcast, private cloud, Security, server, virtualization, Xeon
Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Eran Birk, fab, fabrication plant, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel, Jay Alexander, mobility, Security, smart phones
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, virtualization Tags: BYOC, BYOD, Client Aware, consumerization, Intel, Intel IT, IT Best Practices, IT Whitepaper, IT@Intel, pdf, Security, VDI, virtualization
|
IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.
To support this initiative, we have [See the full post…] |
Read/Download PDF
|
|
Categories: Intel IT, IT White Papers, IT@Intel, Security Tags: BYOC, BYOD, consumerization, Cyber Risk Management, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Security, smart phones, tablets
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Cyber Risk Management, Enterprise Security, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT infrastructure, IT@Intel, Malcolm Harkins, Security, security threats
Categories: Audio Podcast, Intel, Intel Conversations in the Cloud Tags: Allyson Klein, Big Data, Cloud Computing, Conversations in the Cloud, data center, Dave Nicholson, EMC, Gail Rutkousky, Intel, IT infrastructure, on-boarding, podcast, Security, server, storage, trust, virtualization
|
IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture. [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Alan Ross, Cyber Risk Management, Dennis Morgan, Intel, Intel IT, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, Manish Dave, Omer Ben-Shalom, pdf, Security, Stacy Purcell, Tarun Viswanathan, Timothy Verrall, Toby Kohlenberg
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Christmas, Cyber Risk Management, Cybercriminals, IT Best Practices, IT Business Value, IT Whitepaper, IT@Intel, IT@Intel Technology Tips, Scams, Security, theft, X-Mas, Xmas
Categories: HD Video, Intel, The Tomorrow Project Tags: Brian David Johnson, Computer Science, Cory Doctorow, encryption, Futurist, privacy, rainbow table, Science, science fiction, science fiction writer, Security, Society, Technology, technology activist, wireless networks
Categories: Audio Podcast, Cloud Computing, Intel Conversations in the Cloud, Security, VMware Tags: Allyson Klein, applications, Cloud Computing, Conversations in the Cloud, Cyber Risk Management, data center, Intel, manageability, reliability, Security, server, Stu Miniman, VMworld, Wikibon
|
IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor [See the full post…] |
Listen/download audio
|
|
Categories: Audio Podcast, Cloud Computing, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: Alan Ross, Cyber Risk Management, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT Cloud Computing, IT infrastructure, IT@Intel, mobility, Security, virtualization
|
IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…] |
Read/Download PDF
|
|
Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: Core vPro, Cyber Risk Management, Data Protection, drive encryption, encryption, full disk, hard disk encryption, Healthcare IT, Intel IT, IT Best Practices, IT Business Value, IT security, IT@Intel, laptop, mobility, notebook, pilot, privacy, proof of concept, protect data, Security, stolen notebook, stolen pc, theft, vPro
Categories: HD Video, Intel, Intel Labs, Research@Intel Tags: Berkeley, David Wagner, Intel, Intel Labs, Intel Research, Intel Science and Technology Center, John Manferdelli, secure computing, Security, UC Berkeley
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: Allyson Klein, Cloud Computing, Cloud Resource, Conversations in the Cloud, Jay Judkowitz, management, Nimbula, private cloud, Provisioning, Public Cloud, Security, What is Cloud Computing
Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: Alan Ross, Cyber Risk Management, information security, Inside IT, Intel IT, IT Best Practices, IT Business Value, IT@Intel, Malcolm Harkins, Security
Categories: Audio Podcast, Cloud Computing, Intel, Intel Conversations in the Cloud Tags: Allyson Klein, Cloud Computing, Conversations in the Cloud, data center, Hemma Prafullchandra, Hytrust, Security, What is Cloud Computing
Categories: Corporate, Intel, Intel vPro Tags: Anti-Theft Technology, AT-p, Intel, Intel AT, Intel AT-p, Intel vPro, Josh Hilliker, laptop, notebook, poison pill, safety, Security, stolen, theft, thief
|
This is the last in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, Principal Engineer with the Intel’s Information Technology Group. In these videos Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…] |
Watch/download video
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: AMT, event_manager, filtering, IT@Intel, management, network_quarantine, omer_ben_shalom, quarantine, ron_miller, Security, system_defense, video, virus, vPro
|
This is the second in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, principal engineer with Intel’s Information Technology Group. In these videos Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…] |
Watch/download video
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, Intel vPro, Intel-OpenPort, IT@Intel Tags: AMT, event_manager, filtering, IT@Intel, management, network quarantine, Omer Ben-Shalom, quarantine, ron miller, Security, system defense, video, virus, vPro
|
This is the first in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, Principal Engineer with Intel’s Information Technology Group. In these videos, Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…] |
Watch/download video
|
|
Categories: Corporate, Information Technology, Intel, Intel IT, Intel vPro, Intel-OpenPort, IT@Intel Tags: AMT, event_manager, filtering, IT@Intel, management, network quarantine, Omer Ben-Shalom, quarantine, ron miller, Security, system defense, video, virus, vPro
|
Kevin Murray, Sr. Director of Endpoint Security & Management, provides an overview of Symantec Endpoint Management Suite 1.0, and how the product can help organizations secure and recover their information and manage their endpoints. For more information, visit the business [See the full post…] |
Listen/download audio
|
|
Categories: Corporate, Symantec Tags: Endpoint Management, Kevin Murray, Security, Symantec
|
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Results of the Participant Survey)
This is Part Four of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, [See the full post…] |
Watch/download video
|
|
Categories: Connected Social Media, Corporate, Symantec Tags: Andre Gold, Enterprise Security, Samir Kapuria, Security, Security Blueprint, Symantec