The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Improving Data Protection with McAfee Drive EncryptionExecutive OverviewIntel IT is deploying McAfee Drive Encryption, an integral component of new McAfee security products, such as McAfee Complete Data Protection - Advanced software suite. McAfee Drive Encryption provides a hybrid agent that can automatically and transparently detect whether software- or hardware-based encryption is needed.This hybrid approach is an important aspect of encryption manageability for Intel IT because our environment includes an installed base of laptops with Intel® Solid-State Drives (Intel® SSDs) and non-Opal-compliant, self-encrypting drives (SEDs), which require software-based encryption. Our environment also includes Opal-compliant drives, such as the Intel® SSD Pro 1500 Series, which support hardware-based encryption.We experienced a number of benefits with McAfee Drive Encryption, such as the following:• Deployed on more than 40,000 systems with zero data loss to date• 100-percent integration with existing products and processes• One central management console (a “single pane of glass”) that can generate enterprise-wide reports for multiple security solutions, with detailed compliance reporting• Significantly faster resume from hibernation than our previous software-based encryption solution Read the full Improving Data Protection with McAfee Drive Encryption White Paper.
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
Parallels discusses building a cloud with Trusted Compute Pools
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
HyTrust discusses building a secure cloud computing solution.
Trusted compute pools with Intel® TXT
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.