Intel®
United States Home | Select a Location
Site Map | Contact Us | About Intel
ProductsSupport
Advanced Search
Home ComputingBusinessDeveloperReseller / Provider
Intel® Business Computing
Business Products & Services
Success Stories
Solution Providers
IT
Strategies & Trends
News & Events
Site Map
Business Search
Feedback

Performance With Purpose - Intel® Pentium® 4 Processor
information security
Planning your information security strategy? Client systems play an important role in enterprise information security, and PCs based on the Intel® Pentium® 4 processor can help.

the basics
What is enterprise information security? How can security benefit
from high-performance PCs?

how higher-performance PCs can enhance enterprise security
CIO.com: the ABC's of security*
encryption and performance: Pentium® 4 processor benefits

what is the industry saying?
Learn the latest security trends, economic impact of security incidents, and about the move toward trusted computing.

META Group: securing security operating procedures (SOPs)*
[PDF, 89KB]
CERT/CC: overview of internet attack trends* [PDF, 25KB]
the economic impact of malicious code*
trusted computing
Flash* demo describing trusted computing

 

designing, implementing, and justifying a solution
Need help designing or implementing a security solution? Justifying the solution?

enterprise security and the importance of authorization technology
Intel Learning Network Presentation: adaptive infrastructuresecurity
CIO Magazine: finally a real return on security spending

client security solutions from OEMs

IBM*
*
Compaq*
Hewlett-Packard*

useful links

best security practices from Intel
Trusted Computing Platform Alliance*
Computer Security Resource Center*
CERT Coordination Center*



spotlight
encrypted file systems
Deploying client file and folder couldn't be easierit's standard in Microsoft Windows 2000 and Windows XP operating systems. Encrypting File System (EFS) is based on public key encryption, taking advantage of the CryptoAPI architecture in Windows. Here's some detailed information on how to implement EFS to keep your information more secure.
data protection and recovery in Windows XP* [DOC, 205KB]
encrypting file system for Windows 2000* [DOC, 227KB]
encryption and performance: Pentium 4 processor benefits [Flash* animation]
 

more in the essential business technologies series
e-learning
collaboration
XML/data integration
 


the basics

how higher performance PCs can enhance enterprise security
When planning how to protect your corporate information from hackers and other malcontents, don't forget the role your client PCs play in creating a secure infrastructure. Powerful PCs run necessary security solutions without affecting productivity software.
CIO.com: the ABC's of security*

encryption and performance: Pentium 4 processor benefits [Flash* animation]
Demo on how high-performance Intel Pentium 4 processor-based PCs enable you to maintain fast access to your data without compromising security.

back to top


what is the industry saying?

META Group: securing security operating procedures (SOPs)* [PDF, 89KB]
Meta Group projections and recommendations to IT executives on security spending and priorities.

CERT/CC: overview of internet attack trends* [PDF, 25KB]
White paper on internet attack trends published April 2002.

the economic impact of malicious code*
How much is this costing business? See one estimate of the costs of the latest malicious code attacks.

trusted computing
What is trusted computing? What are the benefits?

Flash* demo describing trusted computing
View this demo about the technologies that will improve computer security by adding progressive levels of protection across all computing devices.

 
back to top


designing, implementing, and justifying a solution

enterprise security and the importance of authorization technology
Focusing on the role of authorization in the enterprise security plan, "Enterprise Security and the Importance of Authorization Technology: Formulating an Enterprise Security Plan and an Introduction to Role-Based Authorization" discusses the technologies controlling which systems, resources, and projects a user can access.

Intel Learning Network Presentation: adaptive infrastructuresecurity
This 18-minute audio presentation discusses the role of security technology in network infrastructures, and presents security methods and new authentication technology to validate users and protect network assets.

CIO Magazine: finally a real return on security spending

 
back to top


client security solutions from OEMs

IBM*

*

Compaq*

Hewlett-Packard*

 
back to top


useful links

best security practices from Intel
Explore some of the issues for creating an enterprise security plan raised within the IT Best Practices book titled, Securing Business Information: Strategies to Protect the Enterprise and Its Network. It discusses the necessary steps for building the plan and identifies implementation technologies.

Trusted Computing Platform Alliance*

Computer Security Resource Center*
National Institute of Standards and Technology

CERT Coordination Center*
Internet security expertise from the Software Engineering Institute operated by Carnegie Mellon University.

 
back to top

*Legal Information  |  Privacy Policy
©2002 Intel Corporation