Security issues in cloud computing at Intel, such as data security, application security, compliance, and privacy, discussed by an Intel IT expert.
Security issues in cloud computing at Intel—data security, application security, compliance, and privacy—are discussed by Intel IT expert Alan Ross. Intel’s best practices involve a mix of different types of controls based on level-of-trust zones.
Intel CISO Malcolm Harkins shares his data protection, access, and security in the cloud.
Learn how Intel IT solved security challenges from internet facing applications by securely virtualizing the underlying host architecture.
The purpose of this paper is to describe how Intel IT neutralized security risks that have allowed us to enable virtualization for the DMZ and SIZ thereby allowing Intel IT to expand the benefits of virtualization.
Intel® IT Center Webcast: Security Management Beyond the Operating System. Experts from McAfee and Intel discussed hardware-based IT security.
Intel® IT Center Webcast: Security Management Beyond the Operating System. Learn about innovations in hardware-based IT security from Ed Metcalf, director of Product Marketing at McAfee, and Terry Cutler, Enterprise Solution Architect from Intel.Full View >
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.Full View >
Solution Brief: Redapt Cloud* with Intel® Xeon® processors distributes workload for SHFL entertainment’s online games, reducing costs by 35 percent.
Solution Brief: SHFL entertainment turns to private cloud-based infrastructure from Redapt Cloud* featuring Intel® Xeon® processor E5-2650-based servers to distribute workload for online casino games and reduce total costs by 35 percent.
Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.
The cloud computing security guide PDF provides practical steps to help IT managers plan cloud computing security, with recommendations for strengthening endpoint, platform, and data center infrastructure protections in cloud implementations.
White Paper: Intel® Trusted Execution Technology improves cloud infrastructure with greater visibility and efficiency, and stronger security.
White Paper: The Taiwan Stock Exchange Corporation uses Intel® Trusted Execution Technology in a joint proof of concept to develop a more secure foundation for sensitive cloud workloads that increases visibility, efficiency, and protection.
Security in cloud computing is a critical requirement of the cloud provider used by DreamWorks for workloads it moved off-site.
Security in cloud computing is a critical requirement of the cloud provider used by DreamWorks for workloads it moved off-site to handle peak demand.