The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Executive Insights Intel IT: Information Security should Protect and Enable Information security can enable new usage models while protecting corporate assets.The world is no longer flat. At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role of enterprise security is to both protect and enable Intel’s business, including supporting new usage models like cloud computing, IT consumerization and social computing.A New Security StrategyIn late 2009, Intel IT launched a radical five-year redesign of our information security architecture. This redesign introduces a granular trust model that looks at people and data as the new perimeter.Enabling Employees with New SolutionsIntel IT security team understands the need to enable new technologies and usages, such as IT consumerization and social media – while continuing to protect our enterprise.Embracing RiskMalcolm Harkins, Intel CISO believes running toward the risk in order to help shape and guide the risk represents the best approach to securing an enterprise.Securing Web-based SolutionsOnline is how business is conducted today. Intel IT is actively reaching out to consumers, enterprise customers, and business partners using Web sites and external social media platforms.Read the full Intel IT Executive Insights: Information Security.
Addressing challenges of maintaining productivity and reliability while protecting data.
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Intel CSO Malcolm Harkins discusses security and privacy.
Adding security throughout development and manufacturing.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Intel IT’s New Information Security Strategy