Intel IT’s Roy Ubry talks about their security evaluation of Microsoft Windows* 8 on two Intel® architecture-based tablets for use in the enterprise.
Roy Ubry, Intel IT staff engineer, was part of the team that assessed the security of Microsoft Windows* 8 on new Intel® architecture-based tablets. In this podcast he talks about the evaluation of two types of tablets for use in the enterprise.Full View >
Security issues in cloud computing at Intel, such as data security, application security, compliance, and privacy, discussed by an Intel IT expert.
Discussing security issues in cloud computing at Intel like data security, application security, compliance, and privacy by IT expert Alan Ross.
Intel IT’s Malcolm Harkins and Stacy Purcell discuss Intel’s security business intelligence strategy and the increased capability offered.
An in-depth look at how McAfee Deep Defender*, DeepSAFE* work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Learn how Intel IT identified significant new enterprise security use cases that we can implement using Intel vPro technology.
Intel IT security specialists have identified new enterprise security use cases that we can implement using Intel vPro technology. We focused on 3 high priority, high-value categories and successfully performed lab tests to validate each use case.
Intel IT’s new granular trust model provides dynamic security controls and user access to reduce enterprise risk while improving the user experience.
Intel IT deployed a new granular trust model, designed to support key initiatives such as IT consumerization. This trust model provides dynamic security controls and user access to reduce enterprise risk while improving the user experience.
View a list of solution providers that currently integrate Intel® Trusted Execution Technology into their products for additional trust and security.
View a list of product and solution providers, such as Red Hat*, VMware*, and others, currently integrating Intel® Trusted Execution Technology for additional trust and security.
Intel® AES-NI is a new encryption instruction set, improving on the previous algorithm and accelerating data encryption.
Intel® AES-NI improves on the previous Advanced Encryption Standard (AES) algorithm, accelerating data encryption on the Intel® Xeon® processor family and 2nd generation Intel Core™ processor family.
Intel IT Center Hot Topics to help you get your big projects done. Get help for your peers and industry experts.
Intel IT Center Hot Topics to help you get your big projects done. Get help for your peers and industry experts
Virtualization in the enterprise introduces significant IT security concerns. Read about new virtualization security solutions from Intel and Citrix.
Find out how Citrix XenClient* extends desktop virtualization security, performance, and flexibility to mobile users with Intel® vPro™ technology.