Ir para o conteúdo principal
Logotipo da Intel — Voltar à página inicial
Minhas ferramentas

Selecione o seu idioma

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Acessar para acessar conteúdo restrito

Usando a pesquisa Intel.com

Você pode pesquisar facilmente em todo o site Intel.com de diversas maneiras.

  • Nome comercial: Core i9
  • Número do documento: 123456
  • Code Name: Emerald Rapids
  • Operadores especiais: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Links rápidos

Também é possível experimentar os links rápidos abaixo para ver resultados das pesquisas mais populares.

  • Informações de produto
  • Suporte
  • Drivers e software

Pesquisas recentes

Acessar para acessar conteúdo restrito

Busca avançada

Pesquisar apenas em

Sign in to access restricted content.
  1. Modern, Scalable Cyber Intelligence Platform

A versão do navegador que você está usando não é recomendada para este site.
Por favor, considere atualizar para a versão mais recente do seu navegador clicando em um dos links a seguir.

  • Safari
  • Chrome
  • Edge
  • Firefox

Faça download do PDF
Faça download do PDF

Modern, Scalable Cyber Intelligence Platform

Intel IT is building a modern, scalable cyber intelligence platform (CIP), using an Apache Kafka data pipeline based on Confluent Platform.

Advanced cyber threats continue to increase in frequency and sophistication, threatening computing environments and impacting businesses’ ability to grow. More than ever, large enterprises must invest in effective information security, using technologies that improve detection and response times. Apache Kafka is the foundation of our CIP architecture. We achieve economies of scale as we acquire data once and consume it many times. Simplified connection of data sources helps reduce our technical debt, while filtering data helps reduce costs to downstream systems. We selected Confluent as our Kafka partner to help with the typical pain points and risks that accompany pure open source software deployments. We immediately started to realize benefits of Kafka by achieving economies of scale. We can now acquire data once and consume it many times. Other benefits like reduction of technical debt by eliminating legacy point-to-point and custom connectors soon followed. And through data filtering, we have reduced the cost of ingest and storage in a variety of downstream systems. Confluent provides enterprise capabilities beyond open source Apache Kafka that make it more powerful, manageable, maintainable, and easy to use. Some of these key capabilities are:

  • Confluent Control Center for monitoring our Kafka clusters
  • Replicator and Multi-Region Clusters for multiple data center design and fault tolerance
  • Auto Data Balancer for cluster rebalancing and easy scale out, when needed
  • Enterprise-grade security including Role-based Access Control and audit logs
  • 100+ pre-built connectors to common sources and sinks
  • Technical Account Manager for feature prioritization and guidance
  • Architecture and design partnership via a Confluent Resident
  • Architect and “health check” engagements
  • Ongoing training available in real time (for example, webinars) and on demand
  • Availability of 24x7x365 support
  • Partnership for collaborating on new capabilities, such as security features

Our CIP is based on Intel® Xeon® Scalable processors and Intel® solid state drives (SSDs). Intel vice president and Chief Information Security Officer, Brent Conran, explains, “Kafka helps us produce contextually rich data for both IT and our business units. Kafka also enables us to deploy more advanced techniques in-stream, such as machine-learning models that analyze data and produce new insights. This helps us reduce mean time to detect and respond; it also helps decrease the need for human touch. The most transformational capability of Kafka for cybersecurity is in-stream processing. The ability to operate on data as it is produced helps security responders improve detection techniques and response times. It also enables us to develop and deploy more advanced techniques, such as machine-learning models that perform in-stream processing, which can identify threats in near real time. These advances are helping us achieve our mission to “make it safe for Intel to go fast.” Using industry-leading technologies that provide a modern scalable architecture enables us to continue to transform well into the future.

Transforming Intel’s Security with Data Intelligence

Intel IT's Cyber Intelligence Platform uses machine learning to significantly increase the depth and speed of cyber intelligence.

Learn more

Security Architecture Enables Intel’s Digital Transformation

Intel IT’s security architecture uses a modular, collaborative approach to help businesses achieve goals faster without sacrificing security.

Learn more

Advanced Persistent Threats: Hunting the One Percent

Intel IT is protecting the enterprise against advanced persistent threats (APTs), using machine learning and other techniques.

Learn more

Mostrar mais Mostrar menos

Vídeos relacionados

Mostrar mais Mostrar menos

Materiais relacionados

  • Informações sobre a empresa
  • Nosso compromisso
  • Inclusão
  • Relações com investidores
  • Fale conosco
  • Sala de imprensa
  • Mapa do site
  • Empregos
  • © Intel Corporation
  • Termos de uso
  • *Marcas comerciais
  • Cookies
  • Privacidade
  • Transparência da cadeia de fornecimento
  • Não compartilhar minhas Informações pessoais California Consumer Privacy Act (CCPA) Opt-Out Icon

As tecnologias Intel® podem exigir ativação de hardware, software específico ou de serviços. // Nenhum produto ou componente pode ser totalmente seguro. // Os seus custos e resultados podem variar. // O desempenho varia de acordo com o uso, a configuração e outros fatores. Saiba mais em intel.com/performanceindex // Veja nossos Avisos e isenções de responsabilidade legais completos. // A Intel está comprometida em respeitar os direitos humanos e evitar cumplicidade com abusos de direitos humanos. Consulte Princípios Globais de Direitos Humanos da Intel. Os produtos e software da Intel são destinados a serem utilizados apenas em aplicações que não causem ou contribuam com a violação de um direito humano reconhecido internacionalmente.

Logotipo de rodapé Intel