Intel IT has a new information security strategy called “Protect to Enable,” designed to increase productivity and innovation, while decreasing risk.
Can Information Security survive? Intel IT is tackling this challenge with a new information security strategy called “Protect to Enable.” Its security architecture is designed to increase productivity and innovation, while actually decreasing risk!Vollständige Ansicht >
Use Wi-Fi to create Location-Based Services with AeroScout’s MobileView* to find rooms, printers, or locate Intel® vPro™ technology-based devices.
Get faster and easier; use Wi-Fi to create Location Based Services Applications for tagged devices and assets with AeroScout’s MobileView* software to quickly find conference rooms or printers, or locate other Intel® vPro™ technology-based devices.Vollständige Ansicht >
Podcast: Inside IT and Jon McDermott discuss Intel IT’s approach to development and deployment of pervasive computing services for the enterprise.
Anytime, anywhere learning with personal Ultrabook™ 2 in 1 systems featuring Intel® WiMAX empowers Northern Michigan University students and faculty.
By partnering with Intel, Northern Michigan University empowers students and faculty with Tablets in the Classroom by providing personal Ultrabook™ 2 in 1 systems featuring Intel® Core™ i5 processors and Intel® WiMAX technologyVollständige Ansicht >
Video: Intel® vPro™-based PCs allow IT Authorities to save annual costs in reduced energy.
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attack while boosting performance.Vollständige Ansicht >
Video: enhancing server and cloud security with Intel® Trusted Execution Technology.
Video: enhancing server and cloud security with Intel® trusted execution technology.Vollständige Ansicht >
Video: Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more.
Provides identity and access control, and protects the content during transit to / from the cloud.
Video mit wichtigen Erkenntnissen aus Untersuchungen der Cloud-Sicherheitsproblematik; Umfrage bei IT-Managern, die Einblicke in Cloud-Sicherheitsprobleme bietet.
Video reporting key findings from cloud security issues research with 200 IT managers. Includes how security influences cloud implementation.Vollständige Ansicht >