Case Study: Describes issues of healthcare data breaches, and offers solutions from Intel Security Group that can protect healthcare organizations.
Case Study: Explores issues associated with healthcare data breaches and details solutions offered by Intel Security Group, which has a broad portfolio of software and hardware solutions to lower risks and protect healthcare organizations.
White Paper: Describes how Intel IT's SaaS security best practices enhance security and allow business groups to quickly adopt new SaaS solutions.
White Paper: Discover Intel IT's SaaS security best practices, which recommends a well-defined strategy and reference architecture, a way to balance risk and productivity, SaaS security controls, and vigilant review of technology developments.
White Paper: McAfee Drive Encryption offers data protection for corporate and intellectual property and improves user experience and productivity.
White Paper: Intel IT discusses the data protection benefits of replacing software-based encryption solutions with McAfee Drive Encryption, including integrated manageability, compliance reporting capabilities, and an improved user experience.
In this video, Intel CISO Malcolm Harkins gives his unique point of view on security and social computing, suggesting we embrace it to reduce risk.
Intel CISO Malcolm Harkins gives his unique point of view on security and social computing. In this video blog, Malcolm suggests we should embrace social media and social computing to reduce risk.Full View >
Video blog: Intel CISO Malcolm Harkins shares why Intel IT has undertaken a radical new five-year redesign of our information security architecture.
In this video blog, Intel CISO Malcolm Harkins talks about why Intel IT has undertaken a radical new five-year redesign of our information security architecture. Malcolm says that compromise is inevitable under almost any compute model, find out why.Full View >
Intel CISO Malcolm Harkins talks enterprise security and BYOD consumerization and the challenges of balancing security and employee expectations.
User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.
User Guide: Describes how to use the Intel® Active Management Technology Configuration Utility (Intel® AMT Configuration Utility), which configures systems to use Intel® AMT, including user prerequisites, and security and network requirements.
Guide: a short test case on how to use Intel® AES-NI with Oracle Transparent Data Encryption* (TDE).
This guide outlines a short test case on how to use Intel® AES-NI with Oracle* Transparent Data Encryption (TDE). Intel AES New Instructions (AES-NI) was first introduced in March 2010 and are also on the Intel® Xeon® processor codenamed Westmere-EX.