La versión del navegador que está utilizando no es aconsejable para este sitio.Considere actualizar a la última versión de su navegador haciendo clic en uno de los enlaces siguientes.
Lo sentimos, este PDF solo está disponible en formato para descarga
Executive Insights Intel IT: Information Security should Protect and Enable Information security can enable new usage models while protecting corporate assets.The world is no longer flat. At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role of enterprise security is to both protect and enable Intel’s business, including supporting new usage models like cloud computing, IT consumerization and social computing.A New Security StrategyIn late 2009, Intel IT launched a radical five-year redesign of our information security architecture. This redesign introduces a granular trust model that looks at people and data as the new perimeter.Enabling Employees with New SolutionsIntel IT security team understands the need to enable new technologies and usages, such as IT consumerization and social media – while continuing to protect our enterprise.Embracing RiskMalcolm Harkins, Intel CISO believes running toward the risk in order to help shape and guide the risk represents the best approach to securing an enterprise.Securing Web-based SolutionsOnline is how business is conducted today. Intel IT is actively reaching out to consumers, enterprise customers, and business partners using Web sites and external social media platforms.Read the full Intel IT Executive Insights: Information Security.
Intel CSO Malcolm Harkins discusses security and privacy.
Adding security throughout development and manufacturing.
Addressing challenges of maintaining productivity and reliability while protecting data.
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Demos using existing embedded cyber security technology to simulate utility substation protection.