Editor’s Pick: U.S. Cyber Chief on Cloud Security
U.S. Cyber Chief Says Cloud Computing Can Manage Serious Cyber Threats
Editor’s Pick: General Keith Alexander, commander of U.S. Cyber Command and director of the National Security Agency, spoke at DARPA’s cyber colloquium about securing cloud environments. He acknowledged that the cyber threats military and national security systems face are daunting, but said that cloud computing is one way to reshape the way IT managers think about security. In addition to reining in IT costs, cloud computing can be viewed as a single defensible system. He called for changing the way IT managers think about defending systems and the development of defensible architectures.
VideoVisualizza più video
Peer Research Video: Cloud Security Issues
Cloud security issues research video. (3:36)
Parallels*, ODCA* Proof of Concept Solutions
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Cloud Builders: Parallels and Cloud Security
Parallels discusses building a cloud with Trusted Compute Pools
Securing the Cloud with Intel® TXT Usage Models
Securing the Cloud with Intel® TXT Usage Models (7:43)
Intel IT Cloud Security
Managing privacy, data and application security (6:36)
Intel® AES New Instructions Demo
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more. (2:30)
Cloud Builders: Cloud Security and HyTrust
HyTrust discusses building a secure cloud computing solution.
OpenStack* for Cloud Computing
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data...
Cloud Computing with Intel and Citrix
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to the cloud while keeping sensitive...
Cloud Infrastructure Research
Research video about networking and storage. (3:34)
Cloud Security with Intel® TXT, HyTrust, and Vmware vSphere
Trusted compute pools with Intel® TXT
Secure Cloud with High-Performing Intel Data Protection
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better...
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.