Multi-Level Enterprise Security
Features and Benefits
- Intel® Processors Address New Enterprise Security Challenges
- Network Devices
- Enterprise Client Security
As companies adopt virtualized and cloud infrastructure models, Intel® Xeon® server processors offer hardware-based protection to address new threats.Learn how to address enterprise security challenges >
Reduce the cost of protecting data assets with Intel’s flexible processors and accelerator products that increase both performance and security.Learn more about network devices for IT >
With Intel® processors, enterprise security begins in the data center. Intel® Xeon® processor 5600 series provides hardware-based acceleration for more secure transactions.Learn more about enterprise security >
Protect your entire network with hardware-assisted features built into 3rd generation Intel® Core™ vPro™ processors.1Learn more about enterprise client security >
Enterprise SecurityView More
Case Study: Standardize databases on an Intel®-based virtualized environment for performance and scale.
Case Study: Virtualizing on Intel® Xeon® processors achieves 100-to-1 data center consolidation.
Case Study: Share patient info quickly and securely for greater care and less big data costs.
Ceiba’s touch-based apps for Ultrabook™ spur life science productivity and IT compatibility.
Intel®-based tablets and 2 in 1 devices provide physicians with anywhere, anytime data access.
Case Study: SK Telecom boosts data and cloud storage security with hardware based Intel® AES-NI.
Solution Brief: SECOM and Gamma Solutions get Intel® vPro™ technology-based digital surveillance.
White Paper: Technology improves cloud infrastructure with better visibility and efficiency.
Case Study: John Rowell describes the challenges of cloud services, offering lessons for IT managers.
Expedient explains its expansion to a transparent cloud with a focus on audibility and security.
Trust Visibility Engine* improves analytics performance with Intel® Xeon® processor E7 v2 family.
Kingdom Stock Transaction System succeeds with a reliable, secure, high-performance solution based on the Intel® Xeon®...
Intel IT Key Initiatives
Intel IT Annual Edition
For 2014, we have aligned our IT priorities to Intel’s key focus areas. Building on 2013, we will extend our investments in social, mobile, analytics, and cloud (SMAC) to accelerate Intel products' time to market, grow revenue, and improve operational efficiency.
Enterprise Social Computing and Collaboration
Recognizing the power of social computing as an important tool for supporting the increasing velocity of Intel’s businesses, Intel IT is developing a strategy to boost usage of social computing as part of a unified collaboration experience that better supports employee and business workflows.
Windows* 8 on Intel® Architecture-based Tablets
Intel IT believes that the combination of powerful Intel® architecture-based tablets and Microsoft Windows* 8 provides significant productivity benefits to employees, as well as improved manageability and information security capabilities.
Implementing Apache Hadoop* Software
In just five weeks, we implemented a low-cost, fully realized big data platform based on the Intel® Distribution for Apache Hadoop* software, which is delivering business intelligence results worth millions of dollars to Intel.
Planning for eDiscovery in the Cloud
Intel IT is implementing our technology roadmap for using hybrid cloud services. While cloud computing presents opportunities to reduce costs, increase data availability, and generate new sources of revenue, it also poses electronic discovery (eDiscovery) challenges.
VideosView More Videos
Crimeware Protection on 4th...
See how built-in technologies offer protection in threat mitigation, identity, data, and...
Integrated Security: McAfee...
McAfee and Intel integrated security solutions combine McAfee's leading security software...
Animation: McAfee ePO Deep...
Animation on McAfee ePO Deep Command*.
5th Generation Overview
Explore features of Intel® Core® vPro™ and Intel® Core® M vPro™ processors
Built-in Visual Features...
Visual features optimize graphics to deliver stunning and seamless PC viewing experiences. (2:22)
Intel® Core™ processors secure mobility, online rich media, business operations. (1:55)
Section 2: Intel® SCS Training
Covering Intel® AMT Configuration Utility, remote configuration services, and discovery of...
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
McAfee: Utility Substation...
Demos using existing embedded cyber security technology to simulate utility substation...
Intel® AES New Instructions...
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better... (2:30)
Boost Cloud Security with...
Using Intel® AES-NI in cloud reduces code size, execution cycles, vulnerability to attack... (4:20)
Protect to Enable
Intel IT’s New Information Security Strategy
Inside IT: Enterprise...
Intel CSO Malcolm Harkins discusses security and privacy.
Office Productivity for...
Software industry leaders describe the mobility and business advantages of Intel® Core™ vPro™...
Simpler IT Management and...
CompuCom saves its clients the cost of sending out technicians and cuts downtime while getting...
1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.