• <Läs mer på Intel.com

Security Technology from Intel: Real-World Guide

How IT managers can protect data and infrastructure and meet compliance demands

Den här PDF-filen är tyvärr endast tillgänglig i hämtningsformat

This security technology guide provides an introduction to how Intel® cloud security technologies work together at key enforcement points throughout the cloud, including usage cases that take advantage of:

• Hardware-based and software technologies that use cryptography to protect data and secure connections
• Hardware-based technologies to strengthen identity and access management and secure clients that access the cloud
• API-level controls via service gateways to protect edge systems and applications
• Trusted compute pools to validate platform integrity and provide data to security information and event manager (SIEM) and governance, risk management, and compliance (GRC) dashboards for auditing and compliance purposes