Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 544 Results
  • Items Per Page

Intel® Technology Provider

If you specify, design, build, or resell Intel®-based technology, the Intel® Technology Provider Program is your place for unified reseller support.

Critical Security and the U.S. Cybersecurity Framework: Paper

White Paper: Critical security capabilities are defined in the U.S. Cybersecurity Framework, and Intel provides solutions. (v.3.0, March 2014)

Preview | Download

Laptop and Desktop Mainstream Chipsets

Intel's laptop and desktop mainstream chipsets support the 2nd generation Intel® Core™ processor family with Intel® Turbo Boost Technology 2.0.

Intel® Cloud Builders Secure and Efficient Cloud Infrastructure

Intel® Cloud Builders is a cross-industry initiative aimed at making it easier to build, enhance, and operate cloud infrastructures.

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.

Cloud Computing Security Planning Guide for IT Managers

Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.

Preview | Download

10 Things to Know about Cloud: Cloud Computing Models

Provides a concise look at the core elements of a cloud strategy that meets both IT and business requirements.

Preview | Download

Security Technology Real-World Guide from Intel

A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models.

Preview | Download

Cloud Security Survey from Intel

Cloud security survey from Intel captures key findings from 800 IT managers in the U.S., the UK, China, and Germany on security concerns.

Preview | Download

Private Cloud Security: Virtualizing Highly Secure Cloud Servers

Intel IT created secure cloud servers, with highly sensitive data and applications, using a High Trust Zone (HTZ) architecture.

Preview | Download