Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.
Automated patching solutions are an IT best practice for security with benefits for resources, performance and reporting
: Implementing automated patching solutions lead to numerous benefits with resources, performance and reporting. It’s an IT best practice, improves your resistance to attack, and increases efficiencies through a reduction of manual interventionFull View >
Deploying encryption is foundational to protect any business. Full Disk Encryption, data loss prevention and enterprise rights management capabilities
With the increase in mobile working and highly sensitive data being on various devices, encryption is foundational to protecting any business. It is a mature technology, and virtually transparent to the user, with Full Disk Encryption top of the listFull View >
Counter-Strike*and PlanetSide 2* makers discuss game development on Intel® Xeon® processor-based servers and Ultrabook™ devices.
What is Intel® Core™ vPro™ Technology? Built-in hardware assisted manageability and security features that enable PC management in any system state.
Intel IT discusses the management and security challenges that are part of supporting the Android* OS in the current enterprise environment.
In this podcast, we hear from Rob Evered of Intel’s Information Risk and Security Group. He discusses the management and security challenges that are part of supporting the Android* OS in the current enterprise environment.Full View >
Podcast talks with Intel security architecture and technology development lead Alan Ross about Intel's IT cloud security strategy.
Podcast talks with Intel security architecture and technology development lead Alan Ross about Intel's IT cloud security strategy: segregate virtual environments, employ balance controls, monitor applications while maintaining privacy compliance.Full View >
Learn how Intel IT developed an open-source software and best practices to mitigate insider threats
Learn how Intel IT developed an open-source software and best practices to mitigate insider threatsFull View >
Intel IT looks at how to evaluate Ultrabook™ devices in the enterprise and what to expect as more employees use them in the future.
It’s important for the IT department to ensure security and manageability in devices–even as it promotes mobility and productivity. Hear how Intel IT evaluates Ultrabooks™ in the enterprise and what to expect as more employees use them in the future.Full View >
Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >