Get practical information to help integrate security planning into your cloud computing initiatives.
Get practical planning tips at a glance to help integrate security planning into cloud computing initiatives—from data center to endpoint devices.
Explore cloud computing solutions built on Intel®-based technology. Learn the fundamentals, plan your solution, and decide on the technology you need.
Find out how to simplify delivery of your cloud services with Intel®-based technology. Learn the fundamentals of cloud computing, plan your solution, and decide on the technology you need.
Intel® IT Center webinar: Client security. Discover the built-in security capabilities of the Intel Core™ vPro™ processor.
Intel® IT Center webinar: Join Intel processor architect Yasser Rasheed and John Mahvi, client product line manager for Intel IT, as they reveal the distinctive built-in features designed to address the key concerns of IT security management.
Enterprise server security begins in the data center. Intel® Xeon® 5600 series processors provide hardware-based acceleration for secure transactions.
Server security begins in the data center with the Intel® Xeon® processor 5600 series providing hardware-based acceleration for secure transactions.
Case Study: HackensackUMC standardizes databases on an Intel®-based virtualized environment for performance and scale to reduce TCO and speed ROI.
Case Study: HackensackUMC standardizes and migrates to an Intel® technology-based virtualized environment for Epic EHR and Caché* database, delivering affordable performance and economies of scale to help reduce TCO and speed ROI.
Video: enhancing server and cloud security with Intel® Trusted Execution Technology.
Video: enhancing server and cloud security with Intel® trusted execution technology.Full View >
Cloud security guide to help IT managers plan cloud security, strengthening data center infrastructure and endpoint protection in the cloud.
The cloud computing security guide PDF provides practical steps to help IT managers plan cloud computing security, with recommendations for strengthening endpoint, platform, and data center infrastructure protections in cloud implementations.
A security technology guide from Intel and how security works at key enforcement points throughout the cloud, including specific usage models: cryptography for data protection, identity and access management, service gateways, trusted compute pools.