Lo sentimos, este PDF sólo está disponible en formato para descarga
Intel data protection technologies simplify cryptography tasks without compromising system performance.
Malcolm Harkins discusses security challenges and solutions with cloud computing, IT consumerization, and social computing. (7:19)
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
John Gonzalez speaks from the 2011 Microsoft* Management Summit (3:13)
Video from IT@Intel discusses the isolation of infected PCs and remediation with Intel® vPro™ Technology. (4:33)
Jack Gold and Peter Kastner provide perspectives on the 2nd generation Intel® Core™ vPro™ processor family. (3:34)
Video takes a quick, high-level look at capabilities of 2nd generation Intel® Core™ processor family. (1:41)
Intel IT’s approach to a changing virus landscape.
How Intel IT developed open-source software and best practices
Intel IT talks optimizing security defense strategy through prediction, prevention, detection, and response. (3:08)
Intel IT's Alan Russ discusses data security strategies and equipping users. (3:01)
Intel CISO Malcolm Harkins talks benefits and challenges of IT Consumerization. (1:29)
Malcolm Harkins, Intel CISO, says misperceiving risk is the greatest vulnerability we face today. (2:10)
Intel IT’s New Information Security Strategy
Rick Echevarria covers launch of Intel® Core™ vPro™ processor family and reshaping business computing. (44:28)