Case Study: Describes issues of healthcare data breaches, and offers solutions from Intel Security Group that can protect healthcare organizations.
Case Study: Explores issues associated with healthcare data breaches and details solutions offered by Intel Security Group, which has a broad portfolio of software and hardware solutions to lower risks and protect healthcare organizations.
White Paper: Describes how Intel IT's SaaS security best practices enhance security and allow business groups to quickly adopt new SaaS solutions.
White Paper: Discover Intel IT's SaaS security best practices, which recommends a well-defined strategy and reference architecture, a way to balance risk and productivity, SaaS security controls, and vigilant review of technology developments.
In this video, Intel CISO Malcolm Harkins gives his unique point of view on security and social computing, suggesting we embrace it to reduce risk.
Intel CISO Malcolm Harkins gives his unique point of view on security and social computing. In this video blog, Malcolm suggests we should embrace social media and social computing to reduce risk.Full View >
Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >
Intel CISO Malcolm Harkins talks enterprise security and BYOD consumerization and the challenges of balancing security and employee expectations.
Intel IT has defined a roadmap for a private enterprise cloud that is a shared multi-tenant environment.
Intel IT has defined a roadmap for a private enterprise cloud designed to increase agility and IT efficiency. The private cloud is a shared multi-tenant environment built on a highly efficient, automated, and virtualized infrastructure.
User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.
User Guide: Describes how to use the Intel® Active Management Technology Configuration Utility (Intel® AMT Configuration Utility), which configures systems to use Intel® AMT, including user prerequisites, and security and network requirements.
Guide: a short test case on how to use Intel® AES-NI with Oracle Transparent Data Encryption* (TDE).
This guide outlines a short test case on how to use Intel® AES-NI with Oracle* Transparent Data Encryption (TDE). Intel AES New Instructions (AES-NI) was first introduced in March 2010 and are also on the Intel® Xeon® processor codenamed Westmere-EX.