Painel

Localizar conteúdo

Refinar resultados
Conteúdo relacionado

Marcadores ativos

  • 49 Resultados
  • Itens por página

How Intel Security Defends Against Malware

Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.

Intel® Trusted Execution Technology Framework for Calpella

Software: Package includes Intel® Trusted Execution Technology reference code that can be ported into specific system BIOS implementations.

Proteção de dados avançada com a segurança assistida por hardware

A Intel® garante a proteção dos seus dados mediante consultas aos especialistas em segurança de todo o mundo, oferecendo suporte aos principais padrões de segurança, inovações em segurança e ecossistemas seguros.

SPAR Keeps Mission-Critical Data on the Move Case Study

Study: SPAR Magyarország uses Intel® Xeon® processor E7 family to keep mission-critical data on the move with superior performance and scalability.

Visualizar | Fazer download

Security Preparation: BIOS Based Root Kit Attack

McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.

Intel® Trusted Execution Technology: White Paper

White Paper: Intel® Trusted Execution Technology provides highly scalable platform security in physical and virtual infrastructures.

Visualizar | Fazer download

What is Intel® TXT, Intel® Trusted Execution Technology?

James Greene,shares the benefits of a hardware root of trust with Intel® Trusted Execution Technology, Intel® TXT.

Cloud Security: Trusted Compute Pools by Intel

Watch as our daring hero confronts new-found threats in the cloud and discovers he has a secret weapon: Intel® Trusted Execution Technology.

Hardware-Based Security Protects Embedded Systems: Tech Brief

Technology Brief: Hardware-based security hierarchies create system privilege levels, preventing malware and intrusion attacks. (v.001, July 2009)

Visualizar | Fazer download

Trusted Computing and Security with HyTrust and VMware

Trusted cloud computing deployment and operation designed to enforce cloud security policies with Intel® Trusted Execution Technology.

Visualizar | Fazer download