Desculpe-nos, mas este PDF está disponível somente no formato download
Intel CIO Diane Bryant talks benefits Intel IT sees in transitioning to new Intel-based PCs running Microsoft Windows 7*. (3:13)
Intel® AMT setup is fast and easy with remote configuring and patching for time and cost savings.
Intel® SCS 8 Training Introduction
Module 1: Introduction to Intel® vPro™ Technology
Module 2: Intel® SCS Overview
Demos using existing embedded cyber security technology to simulate utility substation protection.
Intel data protection technologies simplify cryptography tasks without compromising system performance.
IT Security: Embedded Authentication
A new approach to mitigating insider threats.
IT security: Prevent stealthy threats.
Synergistic software and hardware prevent, automate detection, and remedy against rootkit attacks.
Tamper-resistant hardware and leading software offer comprehensive data protection, secure authentication.
Securities in Intel® processors with McAfee software offer layered protection against stealth attacks.
How Intel IT developed open-source software and best practices
Client-to-cloud demo showing end-user and IT admin perspectives using Intel® TXT to check BIOS and OS.
Enhance laptop security with Intel® Anti-Theft Technology (Intel® AT) and immediate shutdown.
Intel joins proven security providers to bring robust Intel® Anti-Theft Technology solutions.
U.S. Defense Intelligence Agency’s Next-Generation Desktop Initiative seeks to improve security and costs and enhance analyst productivity using Intel® Core™ i5 vPro™ processors.
Visualizar | Fazer download
Os servidores baseados na família de processadores Intel® Xeon® E7 oferecem recursos de gerenciamento e segurança de missão...