Security issues in cloud computing at Intel, such as data security, application security, compliance, and privacy, discussed by an Intel IT expert.
Security issues in cloud computing at Intel—data security, application security, compliance, and privacy—are discussed by Intel IT expert Alan Ross. Intel’s best practices involve a mix of different types of controls based on level-of-trust zones.
Intel CISO Malcolm Harkins shares his data protection, access, and security in the cloud.
Learn how Intel IT solved security challenges from internet facing applications by securely virtualizing the underlying host architecture.
The purpose of this paper is to describe how Intel IT neutralized security risks that have allowed us to enable virtualization for the DMZ and SIZ thereby allowing Intel IT to expand the benefits of virtualization.
Intel® IT Center Webcast: Security Management Beyond the Operating System. Experts from McAfee and Intel discussed hardware-based IT security.
Intel® IT Center Webcast: Security Management Beyond the Operating System. Learn about innovations in hardware-based IT security from Ed Metcalf, director of Product Marketing at McAfee, and Terry Cutler, Enterprise Solution Architect from Intel.Full View >
Download Intel® AMT high-level APIs and access resources such as supported features, configuration settings, and demonstrations.
Download Intel® Active Management Technology high-level APIs and access resources such as supported features, configuration settings, and demonstrations.
White Paper: Convert commercial automation systems from PowerPC* to Intel® architecture, improving performance and security. (v.001, Aug. 2011)
White Paper: Benefits of converting commercial automation systems from PowerPC* to Intel® architecture, including enhanced system performance, scalability, improved security, and cost savings. (v.001, Aug. 2011)
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.Full View >
Solution Brief: Redapt Cloud* with Intel® Xeon® processors distributes workload for SHFL entertainment’s online games, reducing costs by 35 percent.
Solution Brief: SHFL entertainment turns to private cloud-based infrastructure from Redapt Cloud* featuring Intel® Xeon® processor E5-2650-based servers to distribute workload for online casino games and reduce total costs by 35 percent.
Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.
The cloud computing security guide PDF provides practical steps to help IT managers plan cloud computing security, with recommendations for strengthening endpoint, platform, and data center infrastructure protections in cloud implementations.