Find Content

Refine Results
Related Content

Active Tags

  • 218 Results
  • Items Per Page

10 Things to Know about Cloud: Cloud Computing Models

Provides a concise look at the core elements of a cloud strategy that meets both IT and business requirements.

Preview | Download

Cloud Services Starter Guide: IT Infrastructure Strategy

Frame the cloud IT conversation with your line of business (LOB) partners and develop effective cloud strategy with this quick planning guide.

Preview | Download

Healthcare-Friendly Security: Usability with Protection

White Paper: Healthcare-friendly security solutions from Intel Security and McAfee allow healthcare organizations to unify usability and security.

Preview | Download

Premises-Aware Security Safeguards Protected Health Information

White Paper: Explores a security capability that could safeguard protected health information with Wireless Credential Exchange-embedded RFID tags.

Preview | Download

Activating Intel® Trusted Execution Technology (Intel® TXT)

Follow the steps to activate your Intel® Trusted Execution Technology (Intel® TXT) and explore useful resources to maximize this security solution.

Intel’s New Approach to the Enterprise Security Framework

White Paper: Intel’s enterprise security framework allows systems to start, run, and stay secure through security features built into the hardware.

Preview | Download

What is McAfee ePO Deep Command*

What is McAfee ePO Deep Command*? Learn how McAfee ePO Deep Command helps IT enhance security and lower costs.

Case Study: Cutting Epic and Caché* TCO at University Health

See how the Intel® Xeon® processor E7 family is helping University Health cut total cost of ownership (TCO) for its Epic and Caché* deployment.

Preview | Download

University Health Migrates Database and Reduces TCO Infographic

By migrating its EHR database from RISC to an open standards-based architecture, University Health lowers TCO and boosts performance and flexibility.

Cloud Security—Strengthened with Intel

Find out how Intel® cloud security technologies protect data and infrastructure and enable compliance.