McAfee software works synergistically with Intel® vPro™ technology for prevention, automated detection, and rapid remediation against rootkit attacks.
Intel's Dylan Larson discusses data center security and technologies that improve security at the microprocessor level.
Dylan Larson from Intel discusses the importance of data center securityFull View >
Study: SPAR Magyarország uses Intel® Xeon® processor E7 family to keep mission-critical data on the move with superior performance and scalability.
Study: Intel® Xeon® processor E7 family helps keep mission-critical data on the move, underpinning non-stop retail for SPAR Magyarország with superior performance, scalability, memory, and I/O capability for applications.
Intel IT is moving to a cloud-computing environment, with new security challenges. We evaluated Intel® Trusted Execution Technology (Intel® TXT), a technology in Intel® processors that enables hardware-enforced integrity checks at server startup.
Graphic shows how Intel® Trusted Execution Technology verifies system BIOS and firmware, matches hypervisor measure, and then launches OS and apps.
View a graphic representation of hardware-based Intel® Trusted Execution Technology, which verifies system BIOS and firmware, matches hypervisor measure, and then blocks or launches the operating system and applications.
Video demo shows trusted compute pools with Hytrust Appliance and Intel® Trusted Execution Technology.
Video Demo of trusted compute pools with the Hytrust Appliance and Intel TXT. The demo enforces policy to place virtual workloads in trusted poolsFull View >
Watch as our daring hero confronts new-found threats in the cloud and discovers he has a secret weapon: Intel® Trusted Execution Technology.
Intel takes you on a light-hearted journey through a serious topic: security and compliance in the cloud. Watch as our daring hero confronts new-found threats in the cloud and discovers he has a secret weapon: Intel® Trusted Execution Technology.Full View >
Jim Greene describes Intel® Trusted Execution Technology and hardware integrity checking as a key component of cloud security.