跳转至主要内容
英特尔标志 - 返回主页
我的工具

选择您的语言

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
登录 以访问受限制的内容

使用 Intel.com 搜索

您可以使用几种方式轻松搜索整个 Intel.com 网站。

  • 品牌名称: 酷睿 i9
  • 文件号: 123456
  • Code Name: Emerald Rapids
  • 特殊操作符: “Ice Lake”、Ice AND Lake、Ice OR Lake、Ice*

快速链接

您也可以尝试使用以下快速链接查看最受欢迎搜索的结果。

  • 产品信息
  • 支持
  • 驱动程序和软件

最近搜索

登录 以访问受限制的内容

高级搜索

仅搜索

Sign in to access restricted content.
  1. Boosting IaaS Security in the Public Cloud

不建议本网站使用您正在使用的浏览器版本。
请考虑通过单击以下链接之一升级到最新版本的浏览器。

  • Safari
  • Chrome
  • Edge
  • Firefox

下载 PDF
下载 PDF

Executive Overview

IT departments everywhere face what appears to be conflicting business needs: the need to take advantage of the agility and technology provided by the public cloud and the need to keep proprietary information secure.

Recently, Intel IT has developed a public cloud infrastructure-as-a-service (IaaS) security strategy, which also encompasses platform-as-a-service (PaaS) security. This strategy, complemented by a comprehensive IaaS security architecture, enables Intel business units to use public cloud IaaS to accelerate innovation and time to market while cutting costs.

Successful public cloud usage involves more than just technology. We have adopted new tools, made substantial enhancements to relevant processes, and invested in people's skill sets. We have found that we must regularly invest in developing our IT skills to securely enable Intel's growing number of public cloud IaaS use cases.

Our long-term public cloud IaaS security strategy enables us to apply a compliance process not just to individual IaaS components but also to the entire cloud security configuration.

Other benefits include:

  • Reduced cost through reuse of security tools and services
  • More agile response to business needs
  • Alignment between on-premises and public cloud IaaS security strategies and architectures

Key learnings pave the way for future work:

  • Distributed accountability for IaaS security
  • Effective discovery, vulnerability management, and compliance processes for IaaS use cases
  • Strong identity lifecycle management process and data protection
  • Choice of cloud-oriented solutions
  • Cross-domain team building, combined with various skillsets

We continually assess and enhance security and privacy capabilities, processes, and people's skills to protect Intel's data and the data of our customers.

相关视频

显示更多 显示较少

相关材料

  • 公司信息
  • 英特尔资本
  • 企业责任部
  • 投资者关系
  • 联系我们
  • 新闻发布室
  • 网站地图
  • 招贤纳士 (英文)
  • © 英特尔公司
  • 沪 ICP 备 18006294 号-1
  • 使用条款
  • *商标
  • Cookie
  • 隐私条款
  • 请勿分享我的个人信息 California Consumer Privacy Act (CCPA) Opt-Out Icon

英特尔技术可能需要支持的硬件、软件或服务激活。// 没有任何产品或组件能够做到绝对安全。// 您的成本和结果可能会有所不同。// 性能因用途、配置和其他因素而异。请访问 intel.cn/performanceindex 了解更多信息。// 请参阅我们的完整法律声明和免责声明。// 英特尔致力于尊重人权,并避免成为侵犯人权行为的同谋。请参阅英特尔的《全球人权原则》。英特尔产品和软件仅可用于不会导致或有助于任何国际公认的侵犯人权行为的应用。

英特尔页脚标志