Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 112 Results
  • Items Per Page

Tablets in Healthcare IT: Transforming the Point of Care

Find out how Intel® architecture-based tablets in healthcare are meeting a new standard of care with stronger security and instant access patient data

Preview | Download

Tablets in Healthcare: Transforming the Point of Care

Find out how Intel® architecture-based tablets in healthcare are transforming the point of care by increasing productivity and security.

Preview | Download

Enterprise System Discovery Using Hardware-Based Two Factor Authentication

Implementing online authentication with Intel® Identity Protection Technology.

Preview | Download

Auditing IT Operations with Intel® Active Management Technology

White Paper: Explores options for auditing IT out-of-band management and remote remediation operations with Intel® Active Management Technology.

Preview | Download

Citrix XenClient* Brings Virtualization Security to Mobile Users

Virtualization in the enterprise introduces significant IT security concerns. Read about new virtualization security solutions from Intel and Citrix.

Preview | Download

Allscripts Windows* Solution: Transforming Healthcare

Find out how the Allscripts Windows* solution running on Intel® architecture-based tablets is transforming the physician experience.

Preview | Download

Enterprise Mobility Planning Guide: Increasing Mobile Productivity

The Enterprise Mobility Planning Guide explains how to increase security, flexibility and productivity for your mobile users, with risks and benefits.

Preview | Download

New Choices in Windows* 8 Device Management White Paper

Management considerations for Windows* 8 mobile devices compare Active Directory Domain Services* and Windows 8 and Windows Server* 2012 R2 features.

Preview | Download

4th Generation Intel® Core™ vPro™ Processor Crimeware Protection

See how built-in technologies offer multi-layered crimeware protection in threat mitigation, identity and access, data protection, and monitoring.

Laptop Lost or Stolen? Five Questions to Ask and Answer

White Paper: Aberdeen Group researches trends and offers risk reduction recommendations for companies whose laptops go missing.

Preview | Download