Уточнить результаты
Другие материалы

Активные метки

  • 375 Результаты
  • Результатов на страницу

Cyber Information Sharing to Achieve Specific Security Objectives

Intel® believes cyber information sharing should be viewed as a mechanism to achieve specific security objectives, instead of a goal in itself.

Предварительный просмотр | Материалы для загрузки

Aligning Social Computing with Business Objectives

Our new social platform embodies the principles of crowdsourcing and knowledge sharing in business-friendly ways, improving employee collaboration

Предварительный просмотр | Материалы для загрузки

Secure the Enterprise with Intel® AES-NI: White Paper

Covers Intel® AES New Instructions, its usage models, performance improvements, and cryptographic libraries.

Предварительный просмотр | Материалы для загрузки

Доверенные вычислительные пулы с технологией Intel® Trusted

Learn how trusted compute pools with hardware-based technology enhance server platform security.

Cloud Services Starter Guide: IT Infrastructure Strategy

Frame the cloud IT conversation with your line of business (LOB) partners and develop effective cloud strategy with this quick planning guide.

Предварительный просмотр | Материалы для загрузки

Ноутбуки для бизнеса: устройства Ultrabook™ и 2 в 1

Узнайте подробнее об устройстве Ultrabook™ на базе процессора Intel® Core™ vPro™ разработанного для решения различных бизнес-задач и обеспечения безопасности.

3rd Generation Intel® Core™ vPro™ Processor Overview Animation

See how world-class performance meets built-in security for today’s business PC in the 3rd generation Intel® Core™ vPro™ processor overview animation.

Taking Control of Security: Key Log and Pin Pad Screen Scraping

Manage vulnerability with Intel® vPro™ technology built-in security features and McAfee software for multilayered protection against stealth attacks.

Measuring the Value of Information Security Investments

Intel IT has a new information security investment model which allows IT managers to prioritize investments, based on risk mitigation against threats.

Предварительный просмотр | Материалы для загрузки

Enhancing Security with Intel® Trusted Execution Technology

Повышение степени безопасности серверной среды и облачных вычислений при помощи технологии Intel® Trusted Execution