Dashboard

Inhalte suchen

Suche verfeinern
Inhalte zu diesem Thema

Aktive Tags

  • 61 Ergebnisse
  • Einträge pro Seite

Trusted Compute Pools in Linux* OpenStack* Platform Guide

Download this configuration guide for step-by-step procedures on installing trusted compute pools on Red Hat Enterprise Linux* OpenStack* Platform 3.

Chip Chat: Jim Greene on Data Center Security

Chip Chat’s Allyson Klein interviews Jim Greene, discussing the future of data center security, how to stay ahead of threats, and his new book.

Intel® Trusted Execution Technology: White Paper

White Paper: Intel® Trusted Execution Technology provides highly scalable platform security in physical and virtual infrastructures.

Vorschau | Herunterladen

UOL Cloud Utility Computing: Intel® Trusted Execution Technology

UOL discusses how their cloud utility computing solution benefits from Intel® Trusted Execution Technology for security and load migration.

OpenStack* Open Source Software for Cloud Computing

Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.

Intel, McAfee Share New Security Capabilities

Provides identity and access control, and protects the content during transit to / from the cloud.

What is Intel® TXT, Intel® Trusted Execution Technology?

James Greene,shares the benefits of a hardware root of trust with Intel® Trusted Execution Technology, Intel® TXT.

Trust the Cloud: Intel® TXT, Intel® Trusted Execution Technology

Terremark (Verizon), Hytrust, RSA, and Cisco talk about hypervisor attacks and how Intel® Trusted Execution Technology helps increase cloud security.

Cloud Security Vendor Spotlight: McAfee

Deepak Thakkar discusses how McAfee and Intel are working together to deliver cloud security solutions.

Vorschau | Herunterladen

Security Preparation: BIOS Based Root Kit Attack

McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.