Intel Technology Supporting Cloud Security Enterprise Security: Laptop Anti-Theft Protection This video describes how Intel Anti-Theft Technology (Intel AT), built into the laptop hardware, can help IT administrators outwit thieves, even when they attempt to reimage the operating system, change the boot order, or install a new hard drive. Stolen laptops with Intel AT can be remotely disabled if stolen or lost and, once recovered, quickly reactivated to normal operation. Length: 2:33 minutes. http://www.intel.com/content/www/us/en/enterprise-security/protect-laptop-data-with-anti-thefttechnology.html?wapkw=anti-theft Evolution of Integrity Checking with Intel® Trusted Execution Technology: An Intel IT Perspective In 2010, Intel began transitioning to a private cloud environment to improve efficiency and agility. The highly virtualized multitenant environment creates new security challenges, including those presented by emerging threats such as rootkit attacks. Intel evaluated Intel TXT as part of its analysis of technologies that can potentially address these issues. intel.com/content/www/us/en/pc-security/intel-it-security-trusted-execution-technology-paper.html Intel© Advanced Encryption Standard Instructions (AES-NI) This article by Intel expert Jeffrey Rott is an in-depth look at using Intel AES-NI, with a specific focus on the 2010 Intel Core™ processor family and its performance and security benefits. edc.intel.com/Link.aspx?id=5093 Intel Identity Protection Technology Web page providing an overview of Intel Identity Protection Technology (Intel IPT) intel.com/content/www/us/en/architecture-and-technology/identity-protection/identity-protectiontechnology-general.html?wapkw=identity Regain Control … Secure the Dynamic Perimeter Web page with the latest on products, solutions, news and events, and content from Intel and McAfee related to cloud perimeter security. dynamicperimeter.com/ Securing the Enterprise with Intel® AES-NI This white paper describes AES usage scenarios, performance implications, and the cryptographic libraries that ISVs can use to replace basic AES routines with the Intel AES-NI optimizations. intel.com/content/www/us/en/enterprise-security/enterprise-security-aes-ni-white-paper.html What is Intel® Trusted Execution Technology? In this 10:28-minute video, Intel security expert Jim Greene talks about the benefits of hardware root of trust with Intel TXT and TPMs, and how hardware integrity checking is a key component of cloud security. intel.com/content/www/us/en/cloud-computing/cloud-computing-trusted-execution-technology -video.html 43 Intel IT Center Vendor Round Table | Cloud Security
Cloud Security Vendor Round Table - Page 0001.html
Cloud Security Vendor Round Table - Page 0002.html
Cloud Security Vendor Round Table - Page 0003.html
Cloud Security Vendor Round Table - Page 0004.html
Cloud Security Vendor Round Table - Page 0005.html
Cloud Security Vendor Round Table - Page 0006.html
Cloud Security Vendor Round Table - Page 0007.html
Cloud Security Vendor Round Table - Page 0008.html
Cloud Security Vendor Round Table - Page 0009.html
Cloud Security Vendor Round Table - Page 0010.html
Cloud Security Vendor Round Table - Page 0011.html
Cloud Security Vendor Round Table - Page 0012.html
Cloud Security Vendor Round Table - Page 0013.html
Cloud Security Vendor Round Table - Page 0014.html
Cloud Security Vendor Round Table - Page 0015.html
Cloud Security Vendor Round Table - Page 0016.html
Cloud Security Vendor Round Table - Page 0017.html
Cloud Security Vendor Round Table - Page 0018.html
Cloud Security Vendor Round Table - Page 0019.html
Cloud Security Vendor Round Table - Page 0020.html
Cloud Security Vendor Round Table - Page 0021.html
Cloud Security Vendor Round Table - Page 0022.html
Cloud Security Vendor Round Table - Page 0023.html
Cloud Security Vendor Round Table - Page 0024.html
Cloud Security Vendor Round Table - Page 0025.html
Cloud Security Vendor Round Table - Page 0026.html
Cloud Security Vendor Round Table - Page 0027.html
Cloud Security Vendor Round Table - Page 0028.html
Cloud Security Vendor Round Table - Page 0029.html
Cloud Security Vendor Round Table - Page 0030.html
Cloud Security Vendor Round Table - Page 0031.html
Cloud Security Vendor Round Table - Page 0032.html
Cloud Security Vendor Round Table - Page 0033.html
Cloud Security Vendor Round Table - Page 0034.html
Cloud Security Vendor Round Table - Page 0035.html
Cloud Security Vendor Round Table - Page 0036.html
Cloud Security Vendor Round Table - Page 0037.html
Cloud Security Vendor Round Table - Page 0038.html
Cloud Security Vendor Round Table - Page 0039.html
Cloud Security Vendor Round Table - Page 0040.html
Cloud Security Vendor Round Table - Page 0041.html
Cloud Security Vendor Round Table - Page 0042.html
Cloud Security Vendor Round Table - Page 0043.html
Cloud Security Vendor Round Table - Page 0044.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia