Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Managing privacy, data and application security (6:36)
Hardware-based verification and authentication helps guard identities without slowing productivity.
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Working with companies to make security software that is enhanced by hardware.
Securing the Cloud with Intel® TXT Usage Models (7:43)
Learn how Intel® Xeon® processors are increasing performance of computationally intensive cryptographic algorithms to better...
Research video about networking and storage. (3:34)
Why IT should build a private cloud. (3:08)
Hardware-enhanced features find, freeze, and fix vulnerabilities to enterprise infrastructure.
Addressing challenges of maintaining productivity and reliability while protecting data.
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Intel CSO Malcolm Harkins discusses security and privacy.
Adding security throughout development and manufacturing.
Focusing resources while expanding into cloud BI.