Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 327 Results
  • Items Per Page

Mobile Device Security with Windows* 8.1 Begins in the Hardware

Solution Brief: Strengthen your mobile device security with hardware-enhanced protections on devices powered by Intel® processors with Windows 8.1*."

Preview | Download

Improving productivity and customer satisfaction with tablets

Increasing productivity with Intel® processor-powered tablets.

COMGUARD Expands Its Enterprise Security Portfolio Case Study

Study: COMGUARD and Intel demo the enterprise security services COMGUARD offers with McAfee ePolicy Orchestrator Deep Command* with Intel® AMT.

Preview | Download

Landmark Enhances 3-D Modeling for Oil Production Decision Making

Case Study: Landmark improves performance of 3-D earth modeling software for oil production decision making using Dell Precision* workstations.

Preview | Download

Improving Data Protection with McAfee Drive Encryption

White Paper: McAfee Drive Encryption offers data protection for corporate and intellectual property and improves user experience and productivity.

Preview | Download

Intel® Architecture: Enable the Smart Grid

Intel® Xeon® processors make distributed-intelligence possible. Since components are connected, redistributing stored energy is more efficient.

Security Technology Real-World Guide from Intel

A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models.

Preview | Download

Private Cloud Security: Virtualizing Highly Secure Cloud Servers

Intel IT created secure cloud servers, with highly sensitive data and applications, using a High Trust Zone (HTZ) architecture.

Preview | Download

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.

Cloud Security Survey from Intel

Cloud security survey from Intel captures key findings from 800 IT managers in the U.S., the UK, China, and Germany on security concerns.

Preview | Download