See how the State of Michigan enhanced their mobile workforce productivity and connectivity – and improved services – with mobile devices.
The State of Michigan embraces mobile workforce productivity and brings services directly to citizens by deploying new tablets and 2 in 1 Ultrabooks* to their employees.Full View >
Case Study: Describes issues of healthcare data breaches, and offers solutions from Intel Security Group that can protect healthcare organizations.
Case Study: Explores issues associated with healthcare data breaches and details solutions offered by Intel Security Group, which has a broad portfolio of software and hardware solutions to lower risks and protect healthcare organizations.
White Paper: Describes how Intel IT's SaaS security best practices enhance security and allow business groups to quickly adopt new SaaS solutions.
White Paper: Discover Intel IT's SaaS security best practices, which recommends a well-defined strategy and reference architecture, a way to balance risk and productivity, SaaS security controls, and vigilant review of technology developments.
In this video, Intel CISO Malcolm Harkins gives his unique point of view on security and social computing, suggesting we embrace it to reduce risk.
Intel CISO Malcolm Harkins gives his unique point of view on security and social computing. In this video blog, Malcolm suggests we should embrace social media and social computing to reduce risk.Full View >
Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >
Intel CISO Malcolm Harkins talks enterprise security and BYOD consumerization and the challenges of balancing security and employee expectations.
User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.
User Guide: Describes how to use the Intel® Active Management Technology Configuration Utility (Intel® AMT Configuration Utility), which configures systems to use Intel® AMT, including user prerequisites, and security and network requirements.