Intel IT’s method of creating a virtual environment, while employing a number of controls to maintain the appropriate level of security.