Security tagged posts:

Intel Xeon Processor E5 Livecast: Trends in IT Organizations with Dell – Intel Chip Chat – Episode 186

Intel Xeon Processor E5 Livecast: Trends in IT Organizations with Dell – Intel Chip Chat – Episode 186

In this Intel Chip Chat audio podcast with Allyson Klein: In this archive from the Intel Xeon E5 processor launch, Allyson discusses the new Dell PowerEdge server line based on the Intel Xeon processor E5 family with Brian Payne, [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Dell, Intel, Intel Chip Chat Tags: , , , , , , , , , , , , ,

Building a Private Cloud with Piston Enterprise OS – Intel Conversations in the Cloud – Episode 41

Inside IT: Cell Phones In The Fab

March 13th, 2012 |
Inside IT: Cell Phones In The Fab

IT Best Practices: Episode 20 – There’s a trend in the enterprise that challenges IT: how can we secure productivity gains by allowing employees to use smart phones for work, without compromising security or creating a huge management problem? [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , ,

Enabling Emerging Enterprise Usages with Client–Aware Technologies

Enabling Emerging Enterprise Usages with Client–Aware Technologies

IT Best Practices: Many of us use a variety of devices both in our work life and personal life. Wouldn’t it be great if you could access the information you needed anywhere, anytime, and on whatever device you happened [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, virtualization Tags: , , , , , , , , , , , ,

Improving Security and Mobility for Personally Owned Devices

February 24th, 2012 |
Improving Security and Mobility for Personally Owned Devices

IT Best Practices: Intel IT has made significant progress in responding to the growing demand for use of personally owned devices, such as smart phones, tablets and PCs in the Intel work environment.

To support this initiative, we have [See the full post…]

Download PDFRead/Download PDF  

Categories: Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , ,

Inside IT: Stopping Viruses and Threats

January 3rd, 2012 |
Inside IT: Stopping Viruses and Threats

IT Best Practices: Episode 15 – Information Technology has changed dramatically in just a few years, and the security threat has changed along with it. The opportunities for bad actors to infiltrate an organization have grown, and the nature [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Discussing the Convergence of Servers and Storage with EMC – Intel Conversations in the Cloud – Episode 34

December 20th, 2011 |
Discussing the Convergence of Servers and Storage with EMC – Intel Conversations in the Cloud – Episode 34

In this Intel Conversations in the Cloud audio podcast with Allyson Klein: Dave Nicholson and Gail Rutkousky from EMC’s Alliance team talk about moving towards an IT infrastructure company. They discuss standardizing on Intel architecture-based platforms, the parallelism of [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Intel, Intel Conversations in the Cloud Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: Rethinking Information Security to Improve Business Agility

December 7th, 2011 |
IT Best Practices: Rethinking Information Security to Improve Business Agility

IT Best Practices: To enable rapid adoption of new technologies and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel’s information security architecture. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , ,

IT@Intel Technology Tip: The 12 Scams of Christmas

November 18th, 2011 |
IT@Intel Technology Tip: The 12 Scams of Christmas

IT Best Practices: As the holiday season approaches, we all turn to our computers to help get things done. But be aware that criminals are also looking for ways to get things done, and that may include scamming you. [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , ,

Cory Doctorow and Brian David Johnson: “Knights of the Rainbow Table”

October 14th, 2011 |

The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

September 26th, 2011 |
The Cloud Today and in the Future – A Chat with Wikibon: Intel Conversations in the Cloud – Episode 25

In this VMworld podcast, Stu Miniman from Wikibon drops by to talk about his organization and cloud computing adoption today and in the future. Topics include simplifying the cloud, manageability, regulation, and security.

See also:
Intel Conversations in the Cloud [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Intel Conversations in the Cloud, Security, VMware Tags: , , , , , , , , , , , , ,

Inside IT: Cloud Computing & Security

August 9th, 2011 |
Inside IT: Cloud Computing & Security

IT Best Practices: Episode 5 – The IT organization is undergoing rapid change. Changes like virtualization and consumerization present new opportunities for business, and new challenges for IT. Cloud computing shifts IT to more of a creator and distributor [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Cloud Computing, Inside IT, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual [See the full post…]

Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Intel Labs: Intel Science and Technology Center at UC Berkeley

June 7th, 2011 |
Intel Labs: Intel Science and Technology Center at UC Berkeley

The new Intel Science and Technology Center at the University of California, Berkeley will lead research into secure computing. Professor David Wagner will be the Director of the Center and he will serve as Co-Principal Investigator. Intel Senior Principal [See the full post…]

Download Video FileWatch/download video  

Categories: HD Video, Intel, Intel Labs, Research@Intel Tags: , , , , , , , , ,

Access Cloud Resources with Nimbula – Intel Conversations in the Cloud #12

Inside IT: Security

April 21st, 2011 |
Inside IT: Security

IT Best Practices: Episode 3 – Inside IT is the latest on information technology straight from the people of Intel’s IT organization. In this episode of the podcast, we take a look at the state of IT security with [See the full post…]

Download Audio FileListen/download audio  

Categories: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , ,

Securing the Cloud with Hytrust – Intel Conversations in the Cloud #11

Intel Microarchitecture (Westmere) – Intel Chip Chat – Episode 82

Intel Microarchitecture (Westmere) – Intel Chip Chat – Episode 82

Shannon Poulin previews Intel microarchitecture, codenamed Westmere. Topics covered include key features, energy efficiency, industry reaction and new security enhancements.

Intel Microarchitecture
Intel Chip Chat Home Page [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Intel, Intel Chip Chat Tags: , , , , , , ,

Intel Anti-Theft Technology: Day at the Beach

June 4th, 2009 |
Intel Anti-Theft Technology: Day at the Beach

Every day thousands of laptops are stolen or are lost. Most contain critical information. In this video, Intel’s Josh Hilliker gives us a demo of Intel Anti-Theft Technology. With this new “poison pill” feature, Intel can actually help prevent [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Intel, Intel vPro Tags: , , , , , , , , , , , , , ,

Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 3 of 3

September 12th, 2008 |
Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 3 of 3

This is the last in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, Principal Engineer with the Intel’s Information Technology Group. In these videos Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel-OpenPort, IT@Intel Tags: , , , , , , , , , , , , ,

Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 2 of 3

September 2nd, 2008 |
Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 2 of 3

This is the second in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, principal engineer with Intel’s Information Technology Group. In these videos Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel vPro, Intel-OpenPort, IT@Intel Tags: , , , , , , , , , , , , ,

Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 1 of 3

August 21st, 2008 |
Isolation of Infected PCs and Remediation with Intel vPro Technology – Part 1 of 3

This is the first in a series of three videos from IT@Intel, each featuring Omer Ben-Shalom, Principal Engineer with Intel’s Information Technology Group. In these videos, Omer demonstrates how Intel vPro technology System Defense filtering can be integrated with [See the full post…]

Download Video FileWatch/download video  

Categories: Corporate, Information Technology, Intel, Intel IT, Intel vPro, Intel-OpenPort, IT@Intel Tags: , , , , , , , , , , , , ,

Symantec Endpoint Management Suite 1.0

Symantec Endpoint Management Suite 1.0

Kevin Murray, Sr. Director of Endpoint Security & Management, provides an overview of Symantec Endpoint Management Suite 1.0, and how the product can help organizations secure and recover their information and manage their endpoints. For more information, visit the business [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Symantec Tags: , , ,

The Role of the Controller and Storage System in Enterprise Data

April 7th, 2008 |
The Role of the Controller and Storage System in Enterprise Data

In this second of three podcasts on enterprise data security, PodTech’s Michael Johnson speaks with Phil Bullinger, executive vice president and general manager of the Engenio Storage Group at LSI Corporation. Bullinger explains the role of the storage system in [See the full post…]

Download Audio FileListen/download audio  

Categories: Corporate, Seagate Tags: , , , , , , ,

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 4

February 19th, 2008 |
Building Confidence In Enterprise Security: What is Your “Blueprint”? – Part 4

Building Confidence In Enterprise Security: What is Your “Blueprint”? – Getting Strategic Using the Security Blueprint (Results of the Participant Survey)

This is Part Four of the second episode of the The “Building Confidence in Enterprise Security” video podcast series, [See the full post…]

Download Video FileWatch/download video  

Categories: Connected Social Media, Corporate, Symantec Tags: , , , , ,