Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use that meets regulatory compliance with end-to-end hardware and software security technologies.Full View >
Scalable Intel® Xeon® processor E7 v2 family-based servers provide the performance needed to analyze massive amounts of data for real-time insight.
Discusses how consumers can safely access web sites and combat online security threats with Intel® Identity Protection Technology and MYDIGIPASS.COM*.
Intel® Identity Protection Technology’s Gordon Dolfie and Vasco’s Martin Ahlers discuss how consumers can safely access web sites and combat online security threats by using Intel® Identity Protection Technology and MYDIGIPASS.COM*.Full View >
Video: demonstrates PGP Whole Disk Encryption with Intel Anti-Theft technology to disable stolen or lost PCs.
Animation: Intel® Intelligent Power Node Manager is a smart way to optimize and manage power and cooling resources in the data center.
Enabling server power limiting across racks, aisles, and individual servers at the data center level, Intel® Node Manager dynamically monitors power management for increased density, load balancing, and optimized throughput during power spikes.Full View >
Counter-Strike*and PlanetSide 2* makers discuss game development on Intel® Xeon® processor-based servers and Ultrabook™ devices.
Video: The First American Corporation builds energy-efficient data center with Intel® Xeon® processors, lowering utility costs and server sprawl.
SAS CEO Jim Goodnight speaks at Analytics 2013 about SAS’s commodity hardware, such as servers, racks, blades, and their Intel® Xeon® processors.
SAS CEO Jim Goodnight speaks at Analytics 2013 Conference, discussing SAS’s commodity hardware, such as servers, racks, blades, and the Intel® Xeon® processor inside.Full View >
McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.
McAfee ePO Deep Command*animation shows security management beyond the operating system.