intel security

Results 226 - 250 of 449Sort Results By: Published Date | Title | Company Name
By: Intel     Published Date: Aug 10, 2012
Citrix Xenclient provides local virtual desktop technology that protects sensitive data on laptops, even for disconnected users.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
     Intel
By: Intel     Published Date: Aug 10, 2012
Intelligent Desktop Virtualization (IDV) combines the best end point security with no compromises in user experience, productivity, cost, or flexibility.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
     Intel
By: Intel     Published Date: Aug 10, 2012
An in-depth look at how McAfee Deep Defender and DeepSAFE work with the Intel hardware features to run beyond the OS to detect covert stealth attacks.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management
     Intel
By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
     Intel
By: Intel     Published Date: Aug 10, 2012
Intel® CoreT vProT Processor Comparison provides a Good, Better, Best guide for selecting the best processors to power your business PCs
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
     Intel
By: Intel     Published Date: Aug 10, 2012
McAfee and Intel multilayer security solutions bring fresh innovation to endpoint protection to secure the future of computing and the Internet.
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, security, enterprise applications, data management
     Intel
By: Intel     Published Date: Aug 10, 2012
Find the Intel® laptop processor to meet your business needs with this interactive laptop processor comparison tool
Tags : it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization, enterprise applications, data management
     Intel
By: Intel     Published Date: Apr 11, 2019
The Internet of Things (IoT) unleashes valuable business insights through data that’s gathered at every level of a retail organization. With IoT and data analytics, retailers now have the capability to gather insight into customer behavior, offer more personalized experiences, achieve better inventory accuracy, create greater supply chain efficiencies, and so much more. But with data comes great risk. A recent report by security firm Thales and 451 Research found that 43 percent of retailers have experienced a data breach in the past year, with a third reporting more than one breach.1 Intel® technology-based gateways and Asavie, a provider of next-gen enterprise mobility management and IoT connectivity solutions, offer a security connectivity solution that minimizes the effort and cost to businesses to ensure safety from cybersecurity attacks. In addition, the Intel/Asavie IoT solution provides retailers with a solid basis to build their smart, connected projects:
Tags : 
     Intel
By: Intel     Published Date: Apr 15, 2019
o The growing video surveillance market is driving demand for advanced video analysis technologies. Businesses and organizations from all vertical sectors are looking to leverage the benefits of enhanced detection accuracy and flexibility provided by deep learning to solve their security, safety, and operations challenges. Discover how Agent Vi’s innoVi* leverages cutting-edge deep learning technology to transform the hundreds, or even thousands, of cameras deployed across a city into smart video devices, contributing to the city’s ability to improve security, safety, and incident response citywide.
Tags : 
     Intel
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
     Intel
By: Intel Corp.     Published Date: Apr 25, 2012
Security technologies built into Intel® Xeon® processor-based servers give cloud solution providers tools for security challenges.
Tags : cloud, cloud computing, myths, infrastructure, services, it executives, data, intel, hybrid cloud, enterprise applications, data management
     Intel Corp.
By: Intel Corp.     Published Date: Apr 26, 2012
Dealing with compliance, privacy, data and application security in the cloud
Tags : virtualized web apps, applications, security, securing, agility, efficeincy, intel, transition, cloud, private cloud, challenges, virtualization
     Intel Corp.
By: Intel Corporation     Published Date: Sep 10, 2014
Sponsored by: NEC and Intel® Xeon® processor The goal of ESG Lab reports is to educate IT professionals about emerging technologies and products in the storage, data management and information security industries. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab's expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by NEC Corporation of America. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : lab, reports, improvement, storage, data, technologies, purchasing, valuable, customers, third-party, evaluation, security, information, data management
     Intel Corporation
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what they’re seeing.
Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
This report discusses how CIOs and CISOs can avoid risky tradeoffs and boost threat defenses by deploying next-generation firewalls that are built for both security and network performance.
Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.
Tags : situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Enterprises worldwide rely on network high availability for business continuity. Find out how the capabilities that are part of your next-generation firewall can help ensure that your network is up and running all day, every day.
Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
It's important to identify the right features for your enterprise when evaluating next generation firewalls. Key points include ease of use, centralized management, integrated VPN, high availability, and the ability to stop advanced, sophisticated attacks. Read this latest SANS report as they look in depth at the McAfee Next Generation Firewall as see how it stacks up against demanding enterprise requirements.
Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, security
     Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com