• <More on Intel.com

Intel® IT Center Events

Let's talk IT

Talk to an Expert Series

Join us for this series of interactive Web events that feature experts from Intel and the IT world.

Client Security: Take User Authentication to the Next Level

Amy Doescher, enterprise security product marketing engineer at Intel, and Marty Jost, senior manager of product marketing at Symantec, will explain how you can take authentication to the next level by using embedded hardware-based authentication solutions to help you:

  • Prevent screen scraping and other malware attacks.
  • Reduce costs associated with lost smart cards or tokens.

They’ll even be answering questions live, so be sure to bring a question or two to ask. It’s a great chance to get answers directly from industry experts on IT security.

Intel® IT Center Talk to an Expert webinar series
IT Security and Cost Control without Compromise: A Fresh Look at Authentication
Thursday, July 19, 2012
9 a.m. Pacific Daylight Time


Talk to an Expert Series Materials

Webinar Presentations


Yasser Rasheed

Client Security: New Intel® Processors Come with Embedded Security

Learn about embedded security features that come with new 3rd generation Intel® Core™ vPro™ processors. Our experts revealed how these distinctive built-in features were designed to address the key concerns of IT security management.

Grant Babb

Mitigate Insider Threats with Open-Source Intelligent Security

Let Grant Babb, Proactive Investigations Program manager for Intel IT, tell you about the impact of insider threats on organizations and the open-source software and best practices Intel has developed to preempt this type of attack.

Intel® Xeon® Processor E5 Family Webcast

Intel® Xeon® Processor E5 Family Webcast

Hear Mark Rowland, architect of the Intel® Xeon® processor E5 family, talk about how we designed IT-enhancing features into this breakthrough processor.

Security Management Beyond the Operating System

Security Management Beyond the Operating System

Learn how to bolster remote IT security with hardware-based solutions.

Can information security survive?

Can information security survive?

Malcolm Harkins from Intel talked about how Intel’s “Protect to Enable” strategy keeps data safe.

Jesus Garcia

Peer research webcast

Two-hundred IT managers were surveyed about desktop virtualization. We discussed the results.