Technology Brief: Hardware-based security hierarchies create system privilege levels, preventing malware and intrusion attacks. (v.001, July 2009)
Technology Brief: Hardware-based security hierarchies supported by Intel® processors create system privilege levels, preventing malware and intrusion attacks on operating systems, applications, and secure data. (v.1, July 2009)
Addresses the evolving security threats across physical and virtual infrastructure and the advantages of a highly scalable architecture like Intel® Trusted Execution Technology, a hardware-based technology for enhancing server platform security.
New IT Challenges -- Trends in attackers, IT landscapes, changes in regulatory environment. Intel provides solutions with Intel® TXT and Intel® VT.
Jim Greene, Intel Senior Security Engineer, explores the information security challenges facing IT managers grappling with an evolving landscape where IT is abstracted across virtualization and in the cloud. Intel® TXT and Intel® VT are solutions.Vollständige Ansicht >
Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
IT experts from Intel discuss the OpenStack proof of concept and reference architecture, which outlines how to build a secure, energy efficient cloud computing infrastructure with OpenStack and Intel technology.Vollständige Ansicht >
Create trusted compute pools using VMware vSphere*, HyTrust Appliance*, and Intel® Xeon® processor-based hardware with Intel® TXT.
Learn how to create trusted compute pools using VMware vSphere*, HyTrust Appliance*, and Intel® Xeon® processor-based hardware with Intel® TXT. Protect your cloud, calm your CIO's fears, and see efficiency and cost savings of a cloud infrastructure.Vollständige Ansicht >
Video: enhancing server and cloud security with Intel® Trusted Execution Technology.
Video: enhancing server and cloud security with Intel® trusted execution technology.Vollständige Ansicht >
Provides identity and access control, and protects the content during transit to / from the cloud.
Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.Vollständige Ansicht >
Video mit wichtigen Erkenntnissen aus Untersuchungen der Cloud-Sicherheitsproblematik; Umfrage bei IT-Managern, die Einblicke in Cloud-Sicherheitsprobleme bietet.
Video reporting key findings from cloud security issues research with 200 IT managers. Includes how security influences cloud implementation.Vollständige Ansicht >