SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics.
SIEM architecture–Intel IT’s approach is an IT best practice of three layers: common logging service, correlation layer, and predictive analytics. This security BI architecture consumes 4 billion events per day to deliver near real-time reporting.Просмотр полностью >
Intel IT discusses deployment of McAfee Drive Encryption—how it addresses challenges of maintaining productivity, reliability while protecting data.
See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.
See how technologies built in 4th generation Intel® Core™ vPro™ processors offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and security and monitoring.Просмотр полностью >
McAfee Deep Defender* detects and blocks kernel-based threats using signature- and behavior-based detection for superior malware protection.
Intel IT’s Malcolm Harkins and Stacy Purcell discuss Intel’s security business intelligence strategy and the increased capability offered.
Discover how Intel® technology and products are driving transformation in the energy industry.
Видеоролик, демонстрирующий ключевые результаты исследования облачной инфраструктуры, в ходе которого был проведен опрос ИТ-менеджеров по теме сетей и систем хранения данных.
Why wonder when an Intel® Cloud Technology badge shows which public cloud servers have the technology for security, data protection, and performance?
Discusses how the Powered by Intel® Cloud Technology program works to improve public cloud usage and trust by showing what is in cloud servers.
Discusses some of the security, data protection, and performance factors preventing public cloud usage and how the Powered by Intel® Cloud Technology program works to fix these issues by improving visibility of what technology is in cloud servers.Просмотр полностью >
Video reporting key findings of cloud security issues research; survey of IT managers to provide IT managers with insights into cloud security issues.
Video reporting key findings from cloud security issues research with 200 IT managers. Includes how security influences cloud implementation.Просмотр полностью >