16
SECUR TY ENTERPRISE Stronger with Intel

How Intel Security Is Changing Enterprise Protection

Embed Size (px)

DESCRIPTION

It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you also have to stay within the boundaries of compliance and policy. Here's Intel's philosophy: make security software stronger, with strong hardware. See how from boot time to run time, Intel’s hardware fortifies the security of the enterprise. Learn more at http://intel.com/enterprisesecurity.

Citation preview

Page 1: How Intel Security Is Changing Enterprise Protection

SECUR TYENTERPRISE

Stronger with Intel

Page 2: How Intel Security Is Changing Enterprise Protection

You understand enterprise security,but it can be a logistical nightmare.

AAAAAAAGH!

Page 3: How Intel Security Is Changing Enterprise Protection

But it’s a balancing act between security and freedom.

USER FREEDOM

ENTERPRISE ASSETS

Page 4: How Intel Security Is Changing Enterprise Protection

Software is your greatest ally against attacks, but the attackers are getting better.

Identity Protection

Policy & Compliance

Malware Protection

Network Security

Endpoint Security

Data Protection

Resiliency

Privacy

Page 5: How Intel Security Is Changing Enterprise Protection

Threats are on the rise, and the complexity of the attacks are more sophisticated.

232 million identities exposedin 2011 globally. That wouldequal almost 75% of the US

population at the time.¹

232MILLION

$5.5M is the average cost of acompany breach. Within one day,

that’s $3,819.00 per minute.³

$5.5M

Mobile vulnerabilitiesup 3,300% (10,900)

in the last six months.²

IDENTITY MOBILE ATTACKS BREACH COST

$

!

¹Symantec Internet Threat Security Report, Volume 17. May 2012²Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013

³Symantec, "Internet Security Threat Report: 2011 Trends," April 2012http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf

Page 6: How Intel Security Is Changing Enterprise Protection

How do you improve securityand increase user freedom?

FREEDOMSECURITY

Page 7: How Intel Security Is Changing Enterprise Protection

Here is Intel’s philosophy:Make security software stronger... with hardware.

SECURITY SOFTWARE

INTEL®HARDWARE

Page 8: How Intel Security Is Changing Enterprise Protection

Intel is building security into the computing foundation, directly on the silicon, extending and enhancing the traditional protection

offered by software alone.

Page 9: How Intel Security Is Changing Enterprise Protection

Here is where Intel's hardware assisted security can help.

Identity Anti-Malware ResiliencyData Protection

Page 10: How Intel Security Is Changing Enterprise Protection

Every time a device powered by Intel boots,it starts secure.

STAY SECURESTART SECURE RUN SECURE

Page 11: How Intel Security Is Changing Enterprise Protection

Intel security features run in the background, never disrupting user experience, so the devices run secure.

STAY SECURESTART SECURE RUN SECURE

Page 12: How Intel Security Is Changing Enterprise Protection

If something goes wrong, it’s fixed in a secure environment, so you can stay secure.

START SECURE RUN SECURE STAY SECURE

Page 13: How Intel Security Is Changing Enterprise Protection

Intel is working with its software partners,in critical areas...

Page 14: How Intel Security Is Changing Enterprise Protection

...to strengthen software with hardware when it matters most, where it matters most.

Authentication

Boot Time Run Time Data Integrity

Remediation Recovery

Page 15: How Intel Security Is Changing Enterprise Protection

Intel is making strong software stronger, withsecurity-enhanced hardware.

Just what the enterprise demands.

ANTI-MALWARE

Prevent viruses andmalware such as rootkits and

escalation-of-privilege attacks.

IDENTITY

Strengthen layers of authentication and passwords.

DATA PROTECTION

Encryption for sensistive business data in the cloud as

well as for online transactions.

RESILIENCY

Proactive securitymanagement, monitoring, andremediation regardless of the

operation state.

Page 16: How Intel Security Is Changing Enterprise Protection

Learn more at

intel.com/enterprisesecurity

intelsecurity.com

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases,

including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect

performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be

claimed as the property of others.