• <Home

Security Technology from Intel: Real-World Guide

How IT managers can protect data and infrastructure and meet compliance demands

Desculpe-nos, mas este PDF está disponível somente no formato download

This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:

• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes