Уточнить результаты
Другие материалы

Активные метки

  • 57 Результаты
  • Результатов на страницу

Inside IT: Security by Design - RSA 2014

Intel and ADP talk security by design—the idea of incorporating security measures throughout the entire development and manufacturing process.

How Intel Is Changing Enterprise Protection

Intel is working with companies to make security software that is enhanced with hardware, expanding enterprise protection from boot time to run time.

How Intel Security Helps Protect Identity

Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.

How Intel Security Helps Protect Enterprise Data

Intel speeds security software and makes it stronger by building tools right into the silicon to protect enterprise data and increase efficiency.

Inside IT: McAfee Drive Encryption at Intel

Intel IT discusses deployment of McAfee Drive Encryption—how it addresses challenges of maintaining productivity, reliability while protecting data.

Inside IT: 2013-14 IT Performance Report Intel CIO Kim Stevenson

In the IT performance report, Intel CIO Kim Stevenson takes stock of the accomplishments of 2013 and looks at the year ahead.

SIEM: Intel IT’s Security Business Intelligence Architecture

SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.

Crimeware Protection Video: 4th Gen Intel® Core™ vPro™ Processor

See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.

McAfee Deep Defender* Protects Against Malware

McAfee Deep Defender* detects and blocks kernel-based threats using signature- and behavior-based detection for superior malware protection.

Trusted Computing Platform: Intel Brings Security to the Cloud

Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.