Intel® Identity Protection Technology (Intel® IPT) prevents unauthorized access to your important accounts by improving your level of security.
Intel® Identity Protection Technology (Intel® IPT) prevents unauthorized access to your important accounts by improving levels of security.
Brief: Intel IT’s security business intelligence platform uses a large-scale CLS and real-time correlation engine to deliver faster threat detection.
Brief: Intel IT’s security business intelligence platform incorporates a large-scale common logging service, real-time correlation engine, and custom analytics to deliver faster threat detection.
Explore hybrid cloud computing solutions built on Intel®-based technology.
Find out how to simplify delivery of your cloud services with Intel®-based technology. Learn the fundamentals of cloud computing, plan your solution, and decide on the technology you need.
From laptops for executives to 2 in 1 devices that work on the go, technology powered by Intel® Core™ vPro™ processors offer real business solutions.
From 2 in 1 devices for workers on the go to premium laptops for executives that reflect innovation and security, devices powered by the Intel® Core™ vPro™ processor family ensure there's more than one way to do business.
New SMAP and PML capabilities add to the already strong Citrix XenServer* virtualization platform and the Intel® Xeon® processor E5 family to help further enhance cloud security, and maintain availability and maximum performance for LOB workloads.
White Paper: Describes benefits of Intel® Authenticate, endpoint security in a processor-based multifactor authentication and biometrics solution.
White Paper: Provides comprehensive guidance for those seeking endpoint security, featuring Intel® Authenticate, which offers a powerful processor-based multifactor authentication and biometrics solution for the modern enterprise.
Intel® Authenticate Technology operates at a hardware level to offer the most secure multi-factor identity access management tool for enterprises.
Intel® Authenticate Technology operates at a hardware level, outside of the operating system in order to offer the most secure multi-factor identity access management tool for enterprises.Full View >
Solution Brief: Gain a trusted infrastructure with a solution from HyTrust, VMware and that provides data security on a virtualized platform.
Solution Brief: Gain a trusted, compliant infrastructure with a solution from HyTrust, VMware, and Intel that allows administrators to set consistent policies, audit data security, encryptions, and geolocation for a virtualized cloud infrastructure.