Tableau de bord

Trouver du contenu

Affiner la recherche
Contenus associés

Balises actives

  • 467 Résultats
  • Articles par page

Misperceiving Risk can be the Greatest Vulnerability We Face Today

Video: Malcolm Harkins, Intel CISO, talks about how misperceiving risk may be the greatest vulnerability we face today, whether at home or on the job.

Citrix XenClient* Brings Virtualization Security to Mobile Users

Virtualization in the enterprise introduces significant IT security concerns. Read about new virtualization security solutions from Intel and Citrix.

Aperçu | Télécharger

University of Santiago Hospital: Meeting Demand with IT Efficiency

University of Santiago Hospital Complex provides physicians with anywhere, anytime access with Intel® Core™ i5 processors for greater IT efficiency.

Aperçu | Télécharger

Security and Consumerization with Intel CSO, Malcolm Harkins

Video: Intel CISO Malcolm Harkins talks benefits and challenges of IT Consumerization in the corporate environment.

Enable Native Android* Apps, Enterprise Security

White Paper: Intel IT’s solution for enabling employee access to native Android* e-mail, calendar, and contacts while providing enterprise security.

Aperçu | Télécharger

How to Self-Provision with Intel® vPro™ Technology

Intel IT created a tool using Intel® vPro™ technology that allows employees to self-provision their systems over the WLAN.

Aperçu | Télécharger

Inside IT: Android* Devices in the BYOD Environment

Intel IT discusses the management and security challenges that are part of supporting the Android* OS in the current enterprise environment.

Inside IT: Business Velocity in an Enterprise Security Landscape

Intel CSO Malcolm Harkins discusses enterprise security, ensuring privacy protections, and keeping the proper mindset in the midst of radical change.

Inside IT: Security by Design - RSA 2014

Intel and ADP talk security by design—the idea of incorporating security measures throughout the entire development and manufacturing process.

Mitigate Insider Threats with Open-Source Intelligent Security

Learn how Intel IT developed an open-source software and best practices to mitigate insider threats