Multi-Level Enterprise Security
Features and Benefits
- Intel® Processors Address New Enterprise Security Challenges
- Network Devices
- Enterprise Client Security
As companies adopt virtualized and cloud infrastructure models, Intel® Xeon® server processors offer hardware-based protection to address new threats.Learn how to address enterprise security challenges >
Reduce the cost of protecting data assets with Intel’s flexible processors and accelerator products that increase both performance and security.Learn more about network devices for IT >
With Intel® processors, enterprise security begins in the data center. Intel® Xeon® processor 5600 series provides hardware-based acceleration for more secure transactions.Learn more about enterprise security >
Protect your entire network with hardware-assisted features built into 3rd generation Intel® Core™ vPro™ processors.12Learn more about enterprise client security >
Enterprise SecurityView More
Remote desktop support with Symantec Altiris Client Management Suite* with Intel® vPro™ technology.
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with embedded security and helps...
Intel® Core™ vPro™ processor family, Accenture ARROW*: intelligent performance, manageability, and security.
BMW uses Intel® vPro™ technology for enhanced performance, stability to manage global IT infrastructure.
Discusses upgrade to Intel® vPro™ technology for remote management, productivity, and security.
Intel IT Key Initiatives
Intel IT Annual Edition
For 2014, we have aligned our IT priorities to Intel’s key focus areas. Building on 2013, we will extend our investments in social, mobile, analytics, and cloud (SMAC) to accelerate Intel products' time to market, grow revenue, and improve operational efficiency.
Enterprise Social Computing and Collaboration
Recognizing the power of social computing as an important tool for supporting the increasing velocity of Intel’s businesses, Intel IT is developing a strategy to boost usage of social computing as part of a unified collaboration experience that better supports employee and business workflows.
Windows* 8 on Intel® Architecture-based Tablets
Intel IT believes that the combination of powerful Intel® architecture-based tablets and Microsoft Windows* 8 provides significant productivity benefits to employees, as well as improved manageability and information security capabilities.
Implementing Apache Hadoop* Software
In just five weeks, we implemented a low-cost, fully realized big data platform based on the Intel® Distribution for Apache Hadoop* software, which is delivering business intelligence results worth millions of dollars to Intel.
Planning for eDiscovery in the Cloud
Intel IT is implementing our technology roadmap for using hybrid cloud services. While cloud computing presents opportunities to reduce costs, increase data availability, and generate new sources of revenue, it also poses electronic discovery (eDiscovery) challenges.
VideosView More Videos
Crimeware Protection on 4th...
See how built-in technologies offer protection in threat mitigation, identity, data, and...
Integrated Security: McAfee...
McAfee and Intel integrated security solutions combine McAfee's leading security software...
Managed PKI Solution from...
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver...
Accenture ARROW*: A Solution...
Accenture ARROW* and Intel® vPro™ technology enhance remote PC management to allow technicians...
Section 2: Intel® SCS Training
Covering Intel® AMT Configuration Utility, remote configuration services, and discovery of...
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
CompuCom and 3rd Gen Intel®...
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with...
Animation: McAfee ePO Deep...
Animation on McAfee ePO Deep Command*.
Inside IT: McAfee Drive...
Addressing challenges of maintaining productivity and reliability while protecting data.
Inside IT: Privacy Principles
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Inside IT: Enterprise...
Intel CSO Malcolm Harkins discusses security and privacy.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix...
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing...
Overview: 4th Gen Intel®...
Look Inside™ and see the technology and benefits that the 4th gen Intel® Core™ processor...
1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.