La versione del browser in uso non è consigliata per questo sito.Prendere in considerazione l'aggiornamento alla versione più recente del proprio browser facendo clic su uno dei link seguenti.
Informazioni sulla mobilità >
Scegliete la tecnologia >
Processori Intel® Core™ vPro™ >
Iniziate a sviluppare la vostra strategia BYOD >
Scoprite: Centro IT Intel® >
Interagite: rete di contatti IT >
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Managing privacy, data and application security (6:36)
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Working with companies to make security software that is enhanced by hardware.
Hardware-based verification and authentication helps guard identities without slowing productivity.
Intel® AES-NI offers new instructions that speed up enterprise encryption and offer better performance, security, and more. (2:30)
Securing the Cloud with Intel® TXT Usage Models (7:43)
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better...
Research video about networking and storage. (3:34)
Parallels discusses building a cloud with Trusted Compute Pools
Intel CISO Malcolm Harkins shares his perspective on security and the cloud. (2:16)
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to the cloud while keeping sensitive...
Trusted compute pools with Intel® TXT
HyTrust discusses building a secure cloud computing solution.
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint usage models from the Open Data...