Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.
Intel is working with companies to make security software that is enhanced with hardware, expanding enterprise protection from boot time to run time.
Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.
Get more from your Chromebook* with Intel Inside® and the performance for more tabs, apps, Hangouts*, games, video, and time unplugged.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use that meets regulatory compliance with end-to-end hardware and software security technologies.Full View >
Four IT managers discuss virtual desktop management models for four industries: financial services, education, healthcare, and general office.
Video demo: comments by elementary students and others on how learning is faster and deeper by using the Intel classmate PC.
Video: latest Cisco Unified Computing Systems* announcement based on Intel® Xeon® processor E7 family.
Cisco’s Paul Durzan and Matt Smorto Intel’s Eoin McConnell, Product Line Manager, Data Center Group, to discuss Cisco Unified Computing Systems* based on Intel® Xeon® processor E7 family.Full View >
Video: Intel presents Cedar Trail next-gen Atom™ platform at IDF 2011.
Intel presents Cedar Trail Atom™ platform at IDF 2011Full View >
Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.
Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.Full View >