Intel is working with companies to make security software that is enhanced with hardware, expanding enterprise protection from boot time to run time.
Intel provides verification and authentication capabilities built into the hardware to help protect users’ identities without hindering productivity.
Designed for the data center server and cloud, the versatile Intel® Xeon® processor E5-2600 product family delivers I/O performance and efficiency.
The video shows Intel and SAP co-innovation related to bringing this leadership solution to market exclusively on the Intel® Xeon® processor platform.
Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.
Illustrates how higher performance cores provide significant advantages over lower performance cores, including operating costs and VM space.Full View >
Intel arms your software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities and defend against malware.
Framestore enhances its visual effects leadership in film and integrated advertising with flexible IT solutions based on Intel® Xeon® processors.
Framestore, a UK-based visual effects company, drives expansion and enhances its leadership in film and integrated advertising with flexible IT solutions based on servers powered by Intel® Xeon® processors.Full View >
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use with software and hardware security.
Create a cloud-based trusted computing platform on Intel® processors for multi-tenancy and personal device use that meets regulatory compliance with end-to-end hardware and software security technologies.Full View >
SAS CEO Jim Goodnight speaks at Analytics 2013 about SAS’s commodity hardware, such as servers, racks, blades, and their Intel® Xeon® processors.
SAS CEO Jim Goodnight speaks at Analytics 2013 Conference, discussing SAS’s commodity hardware, such as servers, racks, blades, and the Intel® Xeon® processor inside.Full View >
Video reporting key findings of cloud security issues research; survey of IT managers to provide IT managers with insights into cloud security issues.
Video reporting key findings from cloud security issues research; video report of a survey of IT managers providing insights into cloud security planning. Includes how security influences cloud implementation.Full View >