Guide: Describes components, prerequisites, and setup of Intel® Setup and Configuration Software to configure Intel® Active Management Technology.
Guide: Describes how to use the Intel® Setup and Configuration Software (Intel® SCS) to configure Intel® Active Management Technology, including an overview of components, prerequisites, setting up remote configuration, using the console, and more.
White Paper: McAfee Drive Encryption offers data protection for corporate and intellectual property and improves user experience and productivity.
White Paper: Intel IT discusses the data protection benefits of replacing software-based encryption solutions with McAfee Drive Encryption, including integrated manageability, compliance reporting capabilities, and an improved user experience.
Intel IT discusses the management and security challenges that are part of supporting the Android* OS in the current enterprise environment.
In this podcast, we hear from Rob Evered of Intel’s Information Risk and Security Group. He discusses the management and security challenges that are part of supporting the Android* OS in the current enterprise environment.Visualização completa >
Intel IT’s whole-disk encryption solution for managing Intel® SSDs with Intel® vPro™ technology improves user experience and reduces support issues
Intel IT’s whole-disk encryption solution for laptops with Intel® SSDs with Intel® Active Management Technology, part of Intel® vPro™ technology, improves user experience, increases compliance, and reduces support issues.
Learn how Intel IT identified significant new enterprise security use cases that we can implement using Intel vPro technology.
Intel IT security specialists have identified new enterprise security use cases that we can implement using Intel vPro technology. We focused on 3 high priority, high-value categories and successfully performed lab tests to validate each use case.
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.Visualização completa >
Intel IT’s Irrefutable Laws of Information Security can help organizations balance business needs, with risk mitigation and security controls.
Malcolm Harkins, Intel VP and CISO, discusses the balance between business needs and growth while mitigating information security risks. Understanding the Six Irrefutable Laws of Information Security helps organizations achieve this balance.
Five key questions to help you assess your cyber security strategy and links to information about cyber threat risks assessments and response plans.
Does your company have a documented cyber-threat strategy? Here are five key questions to help you assess your strategy, along with links to more information about developing cyber threat risks assessments and response plans.