Editor’s Pick: Google's Cloud E-mail Security
Google Wins Chance to Prove Cloud Security in Contract Lawsuit
Editor’s Pick: Google wins the chance to prove the security of its cloud e-mail in a suit against the U.S. Interior Department, alleging the agency favored Microsoft in a contract for cloud e-mail services. A federal judge ordered the Interior Department to hire an independent expert to examine the security of Google’s offering. Google stated in the court filings that Google’s product fulfills federal security standards and that the Interior officials refused to provide details on specific requirements in order to shut Google out.
VideosView More Videos
Cloud Builders: Parallels and...
Parallels discusses building a cloud with Trusted Compute Pools
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
Securing the Cloud with...
Securing the Cloud with Intel® TXT Usage Models (7:43)
Secure Cloud with...
Learn how Intel® Xeon® processors are increasing performance of computationally intensive...
OpenStack* for Cloud Computing
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint...
Parallels*, ODCA* Proof of...
Parallels works with Intel to provide security monitoring and service catalogs to deploy...
Intel® AES New Instructions...
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better... (2:30)
Cloud Computing with Intel...
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to...
Cloud Security with Intel®...
Trusted compute pools with Intel® TXT
Cloud Builders: Cloud...
HyTrust discusses building a secure cloud computing solution.
Intel IT Cloud Security
Managing privacy, data and application security (6:36)
Cloud Infrastructure Research
Research video about networking and storage. (3:34)
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix...
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing...