La version du navigateur que vous utilisez n'est pas recommandée pour ce site.Nous vous conseillons de mettre à niveau vers la version la plus récente de votre navigateur en cliquant sur l'un des liens suivants.
Veuillez nous excuser, ce PDF peut uniquement être téléchargé
Executive Insights Intel IT: Information Security should Protect and Enable The world is no longer flat. At Intel IT we realized we needed to rethink how we approach enterprise security. We cannot continue to spend all our resources trying to block every threat. Our new approach takes into consideration that the role of enterprise security is to both protect and enable Intel’s business, including supporting new usage models like cloud computing, IT consumerization and social computing.These resources provide insight into the work that Intel IT is doing in evolving our enterprise security model.A New Security Strategy.In late 2009, Intel IT launched a radical five-year redesign of our information security architecture. This redesign introduces a granular trust model that looks at people and data as the new perimeter.Enabling Employees with new Solutions.Intel IT security team understands the need to enable new technologies and usages, such as IT consumerization and social media – while continuing to protect our enterprise.Embracing Risk.Malcolm Harkins, Intel CISO believes running toward the risk in order to help shape and guide the risk represents the best approach to securing an enterprise.Securing Web-based Solutions.Online is how business is conducted today. Intel IT is actively reaching out to consumers, enterprise customers and business partners using Web sites and external social media platforms.Read the full Information Security should Protect and Enable Executive Insights.
Télécharger le PDF
Intel CSO Malcolm Harkins discusses security and privacy.
Adding security throughout development and manufacturing.
Addressing challenges of maintaining productivity and reliability while protecting data.
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.