In the IT performance report, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013 and looks at the year ahead.
Businesses view IT more and more as a strategic partner, a key differentiator that can help drive IT business value and innovation. In this podcast, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013, and looks at the year ahead.Full View >
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.Full View >
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use that meets regulatory compliance with end-to-end hardware and software security technologies.Full View >
Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.
Explains the architecture evolution to scale-out storage for greater manageability, performance, and utilization with nearly unlimited scalability.
Explains the data center storage architecture evolution to scale-out storage, delivering manageability, more performance, and greater storage utilization with nearly unlimited scalability.Full View >
Automated patching solutions are an IT best practice for security with benefits for resources, performance and reporting
: Implementing automated patching solutions lead to numerous benefits with resources, performance and reporting. It’s an IT best practice, improves your resistance to attack, and increases efficiencies through a reduction of manual interventionFull View >
Deploying encryption is foundational to protect any business. Full Disk Encryption, data loss prevention and enterprise rights management capabilities
With the increase in mobile working and highly sensitive data being on various devices, encryption is foundational to protecting any business. It is a mature technology, and virtually transparent to the user, with Full Disk Encryption top of the listFull View >
Build your private cloud infrastructure with a security strategy for multi-tenant shared services including a trusted compute pool or safe zone
Build your private cloud infrastructure with a security strategy for multi-tenant shared services. In a trusted compute pool, protection is built around the ability to measure a systems launch environment to guard against any malicious tamperingFull View >
Drive innovation to make your business flourish by using agile techniques that allow for mobility, mobile devices, cloud, big data and consumerization
Consumerization, Big Data and Cloud highlight capabilities of bringing technology to market quicker than ever before. Supporting users and customers in innovation comes from mobility and multiple devices as it stimulates different thought processesFull View >
Podcast: Inside IT and Jon McDermott discuss Intel IT’s approach to development and deployment of context-aware computing services for the enterprise.