Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >
Intel’s BYOD program was built to facilitate eDiscovery – legal requests for data –stored on personally owned devices such as smartphones and tablets.
Smart phone security is an issue when employees use them in secure environments. Intel IT has enabled use and maintained security in secure areas.
25 year Intel veteran discusses how Information Technology became such an essential part of the enterprise, and how IT’s role continues to change.
Hear how Intel IT is developing desktop virtualization to give IT more control and give users greater flexibility.
Podcast talks with Ed Jimison about Intel desktop virtualization technology: moving toward a "user-centric" model and away from a "device-centric" model, managing applications and services at the end points, and its associated challenges.Full View >
Video: Intel IT members discuss folding user-owned devices into the IT infrastructure safely and efficiently IT.
Intel IT’s Arun Sagiraju talks about the challenges in restructuring intel.com, the approach taken, and the results of the new Web experience.
Intel IT’s insight into accommodating the influx of mobile devices in the workplace we see now, and preparing for the devices we’ll see in the future.
Podcast talks with Intel security architecture and technology development lead Alan Ross about Intel's IT cloud security strategy.
Podcast talks with Intel security architecture and technology development lead Alan Ross about Intel's IT cloud security strategy: segregate virtual environments, employ balance controls, monitor applications while maintaining privacy compliance.Full View >
More capable and powerful devices can provide numerous benefits, even when accessing cloud-based services.
More capable and powerful devices can improve overall user experience, enhance support for security and manageability capabilities, and provide best fit for emerging enterprise usage model requirements, even when accessing cloud-based services.Full View >