Podcast: Stuart Tyler discusses historic privacy principles and how a company can create an effective approach that enhances business.
Podcast: Stuart Tyler, senior Intel privacy analyst, discusses historic privacy principles, how they can guide the enterprise when devising a privacy program, and how a company can create an effective approach that enhances business.Full View >
The NFL chooses Lenovo to provide workstations, desktops, and ThinkPad* laptops based on Intel® processors for the league.
The NFL chooses Lenovo as the official computer provider for the league because Lenovo serves the needs of its various departments with innovative workstations, desktops, and ThinkPad* laptops based on Intel® processors.
Intelligent, hardware-assisted enterprise security management features come built-in to the Intel® Core™ vPro™ processor.
Intelligent, hardware-assisted enterprise security management features of the new Intel® Core™ vPro™ processors help you easily manage security.
White Paper: Intel IT expands BYOD program to include Android* devices, adapting current best practices to meet security and eDiscovery requirements.
White Paper: Intel IT expands the bring-your-own-device (BYOD) program to include Android* devices in the enterprise network, adapting the current best practices to meet security and eDiscovery requirements and privacy policies.
Brief: Intel IT’s security business intelligence platform uses a large-scale CLS and real-time correlation engine to deliver faster threat detection.
Brief: Intel IT’s security business intelligence platform incorporates a large-scale common logging service, real-time correlation engine, and custom analytics to deliver faster threat detection.
Case Study: Mental health agency increases mobile productivity using a tablet-based unified information system that cuts costs and improves services.
Case Study: A Pennsylvania county agency achieves greater mobile productivity using a tablet-based unified information system that cuts administrative costs, reduces energy consumption, and eliminates the waiting list for mental health services.
Use this planning guide to help manage consumerization security in today’s enterprise.
Planning Guide: Provides information designed to help you improve consumerization security in the new mobile enterprise environment with hardware-enhanced security that protects networks, platforms, applications, and data, and offers remediation.