• <Meer weten, ga naar intel.com

Security Technology from Intel: Real-World Guide

How IT managers can protect data and infrastructure and meet compliance demands

Deze pdf is helaas alleen te downloaden.

This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:

• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes