Cloud Security Issues at Intel
IT Best Practices: Security issues in cloud computing at Intel are discussed in this podcast by Alan Ross, who leads the Security Architecture and Technology Development Team at Intel IT. In addition to data security, application security, compliance, privacy, and more, he describes the Intel strategy for managing security issues in cloud computing—segregating the virtual environment and employing balanced controls.
For example, in lower trust zones, the focus is on detective controls that look for anomalies in the environment. In hosting, data protection involves some preventive controls, such as access management, traditional anti-malware, encryption, and rights management. The highest trust zones get into a full mix of security controls. Application security is also critical, since applications are exposed on the web. While great strides have been made over the past few years in internal and external cloud computing, Intel continues to push the boundaries of innovation in the area of security issues in cloud computing.
VideosView More Videos
Parallels*, ODCA* Proof of...
Parallels works with Intel to provide security monitoring and service catalogs to deploy...
Cloud Infrastructure Research
Research video about networking and storage. (3:34)
Secure Cloud with...
Learn how Intel® Xeon® processors are increasing performance of computationally intensive...
Cloud Builders: Parallels and...
Parallels discusses building a cloud with Trusted Compute Pools
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
OpenStack* for Cloud Computing
IT experts discuss OpenStack proof of concept which aligns with security and carbon footprint...
Cloud Computing with Intel...
With a cloud on-boarding solution from Intel and Citrix, you can move front-end app servers to...
Cloud Security with Intel®...
Trusted compute pools with Intel® TXT
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix...
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing...
What’s Limiting Cloud?
Global cloud computing security research video.