Lo sentimos, este PDF solo está disponible en formato para descarga

Real-World Guide: Intel Security Technology for the Cloud

This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:

• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes

This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:

• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes

Vídeos relacionados