{"id":1534,"date":"2007-05-12T00:00:00","date_gmt":"2007-05-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/12\/intel-pgp-in-security-hookup\/"},"modified":"2021-12-30T11:39:33","modified_gmt":"2021-12-30T11:39:33","slug":"intel-pgp-in-security-hookup","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/12\/intel-pgp-in-security-hookup\/","title":{"rendered":"Intel, PGP In Security Hookup"},"content":{"rendered":"<p>Intel and PGP have announced a partnership to sell encryption products on systems with Centrino Pro and vPro technologies.  Intel (Quote) will integrate PGP&#8217;s products into its Active Management Technology (AMT) framework, which enables IT administrators to remotely troubleshoot desktops and notebooks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PGP security encryption is available now, but Phil Dunkelberger, president and CEO of PGP, thinks this will widen its appeal.  Dunkelberger said PGP will be doing special development projects with Intel to adapt applications and systems utilities to utilize PGP technologies.<\/p>\n<p>The PGP Encryption Platform is an enterprise framework for shared user and key management, policy, and provisioning automated across multiple, integrated encryption applications.  PGP Whole Disk Encryption provides complete, constant disc encryption in real time, protecting the disk drive in its entirety, not just application data at the individual file level.<\/p>\n<p>http:\/\/www.internetnews.com\/security\/article.php\/3677076<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1534","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1534"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1534\/revisions"}],"predecessor-version":[{"id":4021,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1534\/revisions\/4021"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}