Secure transactions on Intel® Identity Protection Technology with Protected Transaction Display, to identify humans and protect from malware scraping.
Secure transactions and prevent ACH fraud with Intel® Identity Protection Technology with protected transaction display, protecting PC display from malware scraping while proving human presence for transaction verification.
Intel’s processors improve risk management technology by helping firms access, store, and analyze large amounts of data to make better decisions.
Intel® Xeon® processor families improve risk management technology by helping firms access, store, and analyze large amounts of data, enabling them to make better decisions.
Usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment and auditing of the security.
James Greene talks about usage models around trusted compute pools, secure on-boarding of virtual machines to a cloud environment, auditing of the security posture in your cloud that are enabled with a hardware root of trust and Intel® TXT.Vista completa >
Server security begins in the data center with Intel® Xeon® 5600 series processors, providing hardware-based acceleration for secure transactions.
Server security begins in the data center with the Intel® Xeon® processor 5600 series providing hardware-based acceleration for secure transactions.
Solution Brief: SQL Server* 2014 and Intel® Xeon® processors support the data-driven enterprise with in-memory performance and big data integration.
Solution Brief: Microsoft SQL Server* 2014 and Intel® Xeon® processor-based data platforms deliver a single-point solution for the data-driven enterprise, with in-memory performance, big data integration, analytics, data management, and more.
New IT Challenges -- Trends in attackers, IT landscapes, changes in regulatory environment. Intel provides solutions with Intel® TXT and Intel® VT.
Jim Greene, Intel Senior Security Engineer, explores the information security challenges facing IT managers grappling with an evolving landscape where IT is abstracted across virtualization and in the cloud. Intel® TXT and Intel® VT are solutions.Vista completa >
Video: enhancing server and cloud security with Intel® Trusted Execution Technology.
Video: enhancing server and cloud security with Intel® trusted execution technology.Vista completa >
White Paper: Application programming interface growth increases data across the cloud and mobile devices, requiring enterprise-class security, reliability, and scalability delivered through an API gateway for enterprise IT infrastructure.
Combining McAfee software and Intel hardware technologies like Intel® TXT, Trapezoid offers end-to-end cloud security.
Combining McAfee software and Intel hardware technologies like Intel® TXT, Trapezoid offers end-to-end cloud security with more information, monitoring, and management capabilities, making it easy to protect physical and virtual environments.Vista completa >