A versão do navegador que você está usando não é recomendada para este website.Considere a possibilidade de fazer a atualização para a última versão do seu navegador clicando em um dos links a seguir.
Desculpe-nos, mas este PDF está disponível somente no formato download
This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:
• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes
Download do PDF
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Hardware-based verification and authentication helps guard identities without slowing productivity.
Secure the future with cloud security technologies from Intel
What are public, private, and hybrid clouds?
Why IT should build a private cloud.