اكتشف كيف تحمي تقنيات أمان السحابة من Intel® البيانات والبنية التحتية وتمكن الامتثال.
اكتشف كيف يمكن لتقنيات أمان السحابة من Intel® مساعدتك في حماية البيانات والبنية التحتية وتمكين الامتثال. تعلم الأساسيات وخطط للحل، وحدد التقنية التي تحتاج إليها.
User Guide: Describes the Intel® Active Management Technology Configuration Utility, including prerequisites, and security and network requirements.
User Guide: Describes how to use the Intel® Active Management Technology Configuration Utility (Intel® AMT Configuration Utility), which configures systems to use Intel® AMT, including user prerequisites, and security and network requirements.
White Paper: Get federal mobility and security with personally owned devices and info on evaluating solutions, ensuring connectivity, and deployment.
White Paper: Info on enabling mobility and security for personally owned devices for federal employees, including evaluating solutions, ensuring connectivity, and deploying BYOD for greater productivity.
IT organizations can implement network virtualization using VMware NSX* and Intel® technologies to enhance agility, security, and scalability.
Using VMware NSX* and Intel® technologies, IT organizations can implement virtual networking that enhances the agility, security, and scalability of operations, enabling CIOs to optimize resource usage and implement efficiencies to meet demands.
Infographic: See how the new Ultrabook™ 2 in 1 executive PC powered by the 6th gen Intel® Core™ vPro™ processor can make your workday great.
Infographic: Find out how the new Ultrabook™ 2 in 1 executive PC powered by the 6th generation Intel® Core™ vPro™ processor can make your workday great with fast logins, more productivity, and the battery power to go the distance.
How to activate Intel® TXT on Intel® Xeon® processor-based PowerEdge* 12G servers for security against hypervisor and other pre-launch attacks.
How to activate Intel® TXT on Intel® Xeon® processor-based Dell PowerEdge* 12G servers to deliver underlying hardware-based security against hypervisor, BIOS, firmware, and other pre-launch software-based attacks.