La versión del navegador que está utilizando no es aconsejable para este sitio.Considere actualizar a la última versión de su navegador haciendo clic en uno de los enlaces siguientes.
Lo sentimos, este PDF solo está disponible en formato para descarga
Executive Insights Intel IT: Information Security should Protect and Enable The world is no longer flat. At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role of enterprise security is to both protect and enable Intel’s business, including supporting new usage models like cloud computing, IT consumerization and social computing.These resources provide insight into the work that Intel IT is doing in evolving our enterprise security model.A New Security Strategy.In late 2009, Intel IT launched a radical five-year redesign of our information security architecture. This redesign introduces a granular trust model that looks at people and data as the new perimeter.Enabling Employees with new Solutions.Intel IT security team understands the need to enable new technologies and usages, such as IT consumerization and social media – while continuing to protect our enterprise.Embracing Risk.Malcolm Harkins, Intel CISO believes running toward the risk in order to help shape and guide the risk represents the best approach to securing an enterprise.Securing Web-based Solutions.Online is how business is conducted today. Intel IT is actively reaching out to consumers, enterprise customers and business partners using Web sites and external social media platforms.Read the full Information Security should Protect and Enable Executive Insights.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Intel CSO Malcolm Harkins discusses security and privacy.
Adding security throughout development and manufacturing.
Addressing challenges of maintaining productivity and reliability while protecting data.
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.