Download this configuration guide for step-by-step procedures on installing trusted compute pools on Red Hat Enterprise Linux* OpenStack* Platform 3.
Download this configuration guide for step-by-step procedures on installing and configuring trusted compute pools on Red Hat Enterprise Linux* OpenStack* Platform 3 with control and compute nodes, storage nodes, and required software and hardware.
Chip Chat’s Allyson Klein interviews Jim Greene, discussing the future of data center security, how to stay ahead of threats, and his new book.
Addresses the evolving security threats across physical and virtual infrastructure and the advantages of a highly scalable architecture like Intel® Trusted Execution Technology, a hardware-based technology for enhancing server platform security.
UOL discusses how their cloud utility computing solution benefits from Intel® Trusted Execution Technology for security and load migration.
UOL discusses the benefits of Intel® technology and Intel® Trusted Execution Technology in their one stop shop Cloud solution for utility computing which provides customized security embedded in the processor and simplified load migration.Vollständige Ansicht >
Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.
IT experts from Intel discuss the OpenStack proof of concept and reference architecture, which outlines how to build a secure, energy efficient cloud computing infrastructure with OpenStack and Intel technology.Vollständige Ansicht >
Provides identity and access control, and protects the content during transit to / from the cloud.
James Greene,shares the benefits of a hardware root of trust with Intel® Trusted Execution Technology, Intel® TXT.
James Greene, Intel Senior Security Engineer, covers benefits of a hardware root of trust with Intel® Trusted Execution Technology (Intel® TXT). Learn why hardware integrity checking is an important element of cloud security and how Intel TXT helps.Vollständige Ansicht >
Terremark (Verizon), Hytrust, RSA, and Cisco talk about hypervisor attacks and how Intel® Trusted Execution Technology helps increase cloud security.
Listen to Terremark (Verizon), Hytrust, RSA, and Cisco talk about the problem of hypervisor attacks and how Intel® Trusted Execution Technology helps increase cloud security. Includes discussions on use models of secure on-boarding.Vollständige Ansicht >
McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.