All Research Sponsored By:Intel
-
E-Guide: Expert guide to Access Management Services in the Cloud
This expert tip takes a look at the steps you can take to utilize cloud services as they become more mainstream and highlights two key architectural and process components of access management services that must be considered in the cloud.
-
Presentation Transcript: Instrumenting Cloud Apps for 360 Visibility and Access Control
User provisioning is a serious problem for enterprises looking to lower the administrative burdens of account management, while also trying to reduce risk. Jesper Tohmo, CTO of Nordic Edge, will cover user provisioning topics that are affecting the security cloud applications.
-
Presentation Transcript: ISACA PCI Compliance Symposium
Organizations who handle credit card information must have a solid security strategy to protect their customer's sensitive data and meet the requirements of PCI DSS. Read this presentation transcript as Blake Dournaee offers insight into PCI DSS and key security practices to build and maintain a secure network through tokenization.
-
Presentation Transcript: Convergence - Four Technologies that Solve Cloud Governance, Risk and Compliance
In this presentation transcript, industry security expert Gunnar Peterson, delivers his insight from field GRC projects to explain why and how the these technologies provides a critical backbone for GRC.
-
Presentation Transcript: Address Network Security and Dramatically Reduce PCI DSS Scope with Gateway Tokenization
Read this presentation transcript for an overview of planned changes to the PCI DSS Standard and pros and cons of available technology solutions. Find out how security gateways offer ideal solutions for handling internal tokenization when maintaining ownership and controlling PAN data are primary organizational concerns.
-
Taking Control of the Cloud for Your Enterprise - Addressing Security, Visibility, and Governance Challenges
It comes as no surprise that some businesses are reluctant to implement cloud-based services. Security risks are a major concern due to the lack of control a business faces when moving critical business systems to the cloud. Find out how to avoid security risks while still taking advantage of the benefits of cloud computing.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment with Intel® Platforms
Traditional access security models have focused on access control for data, applications and networks. But security requirements for cloud environments have evolved beyond traditional measures. Learn how the authorization domains model can be used to enforce a consistent security policy in your cloud computing applications.
-
End-to-End Secure Client to Cloud Access Presentation Transcript
In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud.
-
Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
-
Hosting for the Next Billion Users: Hostway handles growth with Intel® Xeon® processor 5600 and 7500 series
Read this case study to learn how Intel® server technologies and Intel® Xeon® processors 5600 and 7500 series helped global leader in application hosting and infrastructure, Hostway, get ahead of rising demand and thrive in a dynamic market segment.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhanced Cloud Security with HyTrust* and VMware*
This reference architecture explains a secure cloud infrastructure deployment and operation. It describes a cloud built with VMware, vSphere*, Intel® Xeon® processor 5600 series-based server platforms, and a HyTrust Appliance* designed to enforce cloud security policies, including those based on platform trust attestation provided by Intel® TXT.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Trusted Compute Pools with Parallels*
Applying the ideas and principles of cloud computing to IT operations can offer organizations agility and cost savings. For workloads which need to be highly elastic, like those of software developers, using an Infrastructure as a Service (IaaS) approach is often the best choice.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Enhancing Server Platform Security with VMware
Intel® Cloud Builders built a cloud with the use of a technology preview version of VMware vCenter Server, VMware vSphere Hypervisor, Intel Xeon processor 5600 series based server platforms and a plug in designed to interface with Intel Trusted Execution technology to provide platform attestration in the cloud.
-
Intel's Vision of the Ongoing Shift to Cloud Computing
Intel's Cloud 2015 Vision is that cloud computing is federated, automated, and client-aware. Moving the industry toward that promise will require a focus on three industry-wide pillars of cloud computing - efficiency, simplification, and security - and on solutions that are open, multi-vendor and interoperable.
-
Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud
Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more.
-
Cloud Security: Built from the Ground Up
Cloud computing offers the promise of much greater efficiency, flexibility and more simplified datacenters, but it also presents new data security challenges. Learn how executives from Terremark, VMware, and Intel view the challenges and how cloud security technology built into hardware provides the most robust protection to platforms and data.
-
Boost Cloud Security with Intel® AES-NI
Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
-
ISACA PCI Compliance Symposium
As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
-
Reducing PCI DSS Scope: The Gateway Approach
This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
-
Simplify Security for REST and WS* Web Services: The Gateway Approach
This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
-
Rethinking Information Security to Improve Business Agility
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more.
-
Gunner Peterson's Security Gateway Buyer’s Guide
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - Unified Networking with Cisco* Virtualized Multi-Tenant Data Center*
The Intel Cloud Builders program provides a starting point as it supplies a basic hardware blueprint and available cloud software management solutions such as the Cisco* Virtualized Multi-Tenant Data Center (VMDC). The paper focuses on the design of converged fabrics to meet the needs of the multi-tenant, cloud data center.
-
End-to-End Secure Client to Cloud Access
In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
-
Intel® Cloud Builders Guide: Cloud Design and Deployment on Intel® Platforms - VMware vCloud* Director
For enterprise IT and cloud service providers who need to use their existing data center infrastructure to supply cloud services to their customers, this guide, as part of the Intel® Cloud Builders, provides a comprehensive solution overview that covers technical planning and deployment considerations.