Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.
Video mit wichtigen Erkenntnissen aus Untersuchungen der Cloud-Sicherheitsproblematik; Umfrage bei IT-Managern, die Einblicke in Cloud-Sicherheitsprobleme bietet.
Video reporting key findings from cloud security issues research with 200 IT managers. Includes how security influences cloud implementation.Vollständige Ansicht >
Video: Intel presents Cedar Trail next-gen Atom™ platform at IDF 2011.
Intel presents Cedar Trail Atom™ platform at IDF 2011Vollständige Ansicht >
New IT Challenges -- Trends in attackers, IT landscapes, changes in regulatory environment. Intel provides solutions with Intel® TXT and Intel® VT.
Jim Greene, Intel Senior Security Engineer, explores the information security challenges facing IT managers grappling with an evolving landscape where IT is abstracted across virtualization and in the cloud. Intel® TXT and Intel® VT are solutions.Vollständige Ansicht >
Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
IT experts from Intel discuss the OpenStack proof of concept and reference architecture, which outlines how to build a secure, energy efficient cloud computing infrastructure with OpenStack and Intel technology.Vollständige Ansicht >
Create trusted compute pools using VMware vSphere*, HyTrust Appliance*, and Intel® Xeon® processor-based hardware with Intel® TXT.
Learn how to create trusted compute pools using VMware vSphere*, HyTrust Appliance*, and Intel® Xeon® processor-based hardware with Intel® TXT. Protect your cloud, calm your CIO's fears, and see efficiency and cost savings of a cloud infrastructure.Vollständige Ansicht >
Video: enhancing server and cloud security with Intel® Trusted Execution Technology.
Video: enhancing server and cloud security with Intel® trusted execution technology.Vollständige Ansicht >
Provides identity and access control, and protects the content during transit to / from the cloud.
Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.Vollständige Ansicht >
Terremark (Verizon), Hytrust, RSA, and Cisco talk about hypervisor attacks and how Intel® Trusted Execution Technology helps increase cloud security.
Listen to Terremark (Verizon), Hytrust, RSA, and Cisco talk about the problem of hypervisor attacks and how Intel® Trusted Execution Technology helps increase cloud security. Includes discussions on use models of secure on-boarding.Vollständige Ansicht >