Tableau de bord

Trouver du contenu

Contenus associés

Balises actives

  • 44 Résultats
  • Articles par page

OpenStack* Open Source Software for Cloud Computing

Video: IT experts discuss OpenStack proof of concept, which aligns with security and carbon footprint usage models from the Open Data Center Alliance.

Cloud Design Guide with Enhanced Server Platform VMware Security

Security Design Guide: Intel® Trusted Execution Technology, VMware vCenter*, and VMware vSphere* creates cloud platform security.

Aperçu | Télécharger

Securing the Cloud for Financial Institutions

An overview of cloud security issues facing the financial services industry and Intel® Technologies for securing the financial cloud

Aperçu | Télécharger

Securing the Cloud for Government Entities

An overview of cloud security issues facing governmental organizations and Intel® Technologies for securing government cloud

Aperçu | Télécharger

Securing the Cloud for Healthcare Organizations

An overview of cloud security issues facing healthcare organizations and Intel® Technologies for securing the healthcare cloud

Aperçu | Télécharger

Cloud Security Vendor Spotlight: Cisco

Scott Gainey discusses the key components of the Cisco cloud security platform and ways to simplify security management across the enterprise.

Aperçu | Télécharger

Intel and McAfee: Enhancing Cloud Security

Intel and McAfee provide an overview of security technologies and solutions to enhance cloud security from devices to cloud data centers.

Aperçu | Télécharger

Parallels*, ODCA Trusted Computing Proof of Concept Solutions

Parallels partners with Intel to provide security monitoring and service catalogs to effectively deploy trusted virtual machines.

Fujitsu PRIMERGY* Cloud Design and Deployment Guide

Design Guide: Intel® Cloud Builders, Fujitsu Primergy* build guide using VMware vCloud Director* and Intel® Xeon® processors.

Aperçu | Télécharger

Private Cloud Security: Virtualizing Highly Secure Cloud Servers

Intel IT created secure cloud servers, with highly sensitive data and applications, using a High Trust Zone (HTZ) architecture.

Aperçu | Télécharger