Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 132 Results
  • Items Per Page

Inside IT: A Principles-Based Approach to Privacy at Intel

Podcast: Stuart Tyler discusses historic privacy principles and how a company can create an effective approach that enhances business.

Inside IT: Business Velocity in an Enterprise Security Landscape

Intel CSO Malcolm Harkins discusses enterprise security, ensuring privacy protections, and keeping the proper mindset in the midst of radical change.

SIEM: Intel IT’s Security Business Intelligence Architecture

SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.

Crimeware Protection Video: 4th Gen Intel® Core™ vPro™ Processor

See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.

McAfee Deep Defender* Protects Against Malware

McAfee Deep Defender* detects and blocks kernel-based threats using signature- and behavior-based detection for superior malware protection.

Lenovo ThinkPad X1 Carbon* Ultrabook™ Device

Features of the Lenovo ThinkPad X1 Carbon* Ultrabook™ device include fast recharging, instant awakening, light construction, and security.

Inside IT: Security Business Intelligence

Intel IT’s Malcolm Harkins and Stacy Purcell discuss Intel’s security business intelligence strategy and the increased capability offered.

Mobile Science Apps Enhance Lab Productivity

Ceiba’s touch-based mobile science apps use Ultrabooks™ and Windows* 8 Professional to enhance pharmaceutical productivity and IT compatibility.

Cloud Infrastructure Research Video

Video highlighting key findings of cloud infrastructure research, focusing on networking and storage from a survey of IT managers.

Powered by Intel® Cloud Technology

Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.