Dashboard

Find Content

Refine Results
Related Content

Selected Filters

  • 285 Results
  • Items Per Page

Intel® Cloud Builders Secure and Efficient Cloud Infrastructure

Intel® Cloud Builders is a cross-industry initiative aimed at making it easier to build, enhance, and operate cloud infrastructures.

Securing the Cloud with Intel® Trusted Execution Technology

Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.

Cloud Computing Security Planning Guide for IT Managers

Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.

Preview | Download

10 Things to Know about Cloud: Cloud Computing Models

Provides a concise look at the core elements of a cloud strategy that meets both IT and business requirements.

Preview | Download

Security Technology Real-World Guide from Intel

A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models.

Preview | Download

Cloud Security Survey from Intel

Cloud security survey from Intel captures key findings from 800 IT managers in the U.S., the UK, China, and Germany on security concerns.

Preview | Download

Private Cloud Security: Virtualizing Highly Secure Cloud Servers

Intel IT created secure cloud servers, with highly sensitive data and applications, using a High Trust Zone (HTZ) architecture.

Preview | Download

Federal Employee Mobility and Security—It Can Be Done

White Paper: Get federal mobility and security with personally owned devices and info on evaluating solutions, ensuring connectivity, and deployment.

Preview | Download

Healthcare Security: User Experience, Compliance, and Risk

Intel professionals discuss how healthcare information security controls prevent caregivers from optimizing timely care and patient privacy.

Strategies for Healthcare Security and Privacy

White Paper: Outlines various Intel® technologies healthcare organizations can utilize to create a streamlined data security strategy.

Preview | Download