Используемая вами версия браузера не рекомендована для просмотра этого сайта.Установите последнюю версию браузера, перейдя по одной из следующих ссылок.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Working with companies to make security software that is enhanced by hardware.
Hardware-based verification and authentication helps guard identities without slowing productivity.
Cloud security issues research video. (3:36)
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Parallels discusses building a cloud with Trusted Compute Pools
Trusted compute pools with Intel® TXT
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the...
HyTrust discusses building a secure cloud computing solution.
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to...
Enomaly co-founder CTO Reuven Cohen talks about its Elastic Computing Platform* and Intel collaboration. (6:17)
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to the cloud while keeping...
Securing the Cloud with Intel® TXT Usage Models (7:43)
Managing privacy, data and application security (6:36)