لوحة المعلومات

البحث في المحتوى

تحسين النتائج
Related Content

علامات الترميز النشطة

  • 376 النتائج
  • العناصر في كل صفحة

Business Investment Strategy for Device Refresh

Build a business case for and plan a device upgrade and refresh strategy based on decisions that help manage costs and maximize user productivity.

مراجعة | تنزيل

Cloud Security—Strengthened with Intel

Find out how Intel® cloud security technologies protect data and infrastructure and enable compliance.

Parallels* Cloud Developer and Deployment Guide

Reference architecture for Parallels* Trusted Compute Pool deployment on Intel® Xeon® processor-based servers for public or private clouds.

مراجعة | تنزيل

مجموعات أجهزة الكمبيوتر الموثوق بها المزودة بتقنية التنفيذ الموثق بها Intel® Trusted Execution Technology

تعلّم كيف تقوم مجموعات أجهزة الكمبيوتر الموثوق بها المزودة بتقنية مستندة إلى الأجهزة بتحسين أمان النظام الأساسي للخادم.

Cloud Security Vendor Round Table for IT Managers

Cloud security vendor discussion compares answers from nine vendors and service providers to common IT questions for evaluating cloud services.

مراجعة | تنزيل

Improving Data Protection with McAfee Drive Encryption

White Paper: McAfee Drive Encryption offers data protection for corporate and intellectual property and improves user experience and productivity.

مراجعة | تنزيل

3rd Generation Intel® Core™ vPro™ Processor: Features Sales Brief

Brief: 3rd Generation Intel® Core™ vPro™ processor features increased data security, cost effective remote management, and intelligent performance.

مراجعة | تنزيل

Desktops for Business

Built for business. Engineered for security. Innovation in business desktop computing.

HackensackUMC Accelerates ROI for Epic and Cache* Databases

Case Study: HackensackUMC standardizes databases on an Intel®-based virtualized environment for performance and scale to reduce TCO and speed ROI.

مراجعة | تنزيل

McAfee Deep Defender*: Hidden Malware Protection

An in-depth look at how McAfee Deep Defender*, DeepSAFE* work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.