Upload
intel-it-center
View
109
Download
0
Tags:
Embed Size (px)
DESCRIPTION
It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you also have to stay within the boundaries of compliance and policy. Here's Intel's philosophy: make security software stronger, with strong hardware. See how from boot time to run time, Intel’s hardware fortifies the security of the enterprise. Learn more at http://intel.com/enterprisesecurity.
Citation preview
SECUR TYENTERPRISE
Stronger with Intel
You understand enterprise security,but it can be a logistical nightmare.
AAAAAAAGH!
But it’s a balancing act between security and freedom.
USER FREEDOM
ENTERPRISE ASSETS
Software is your greatest ally against attacks, but the attackers are getting better.
Identity Protection
Policy & Compliance
Malware Protection
Network Security
Endpoint Security
Data Protection
Resiliency
Privacy
Threats are on the rise, and the complexity of the attacks are more sophisticated.
232 million identities exposedin 2011 globally. That wouldequal almost 75% of the US
population at the time.¹
232MILLION
$5.5M is the average cost of acompany breach. Within one day,
that’s $3,819.00 per minute.³
$5.5M
Mobile vulnerabilitiesup 3,300% (10,900)
in the last six months.²
IDENTITY MOBILE ATTACKS BREACH COST
$
!
¹Symantec Internet Threat Security Report, Volume 17. May 2012²Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013
³Symantec, "Internet Security Threat Report: 2011 Trends," April 2012http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf
How do you improve securityand increase user freedom?
FREEDOMSECURITY
Here is Intel’s philosophy:Make security software stronger... with hardware.
SECURITY SOFTWARE
INTEL®HARDWARE
Intel is building security into the computing foundation, directly on the silicon, extending and enhancing the traditional protection
offered by software alone.
Here is where Intel's hardware assisted security can help.
Identity Anti-Malware ResiliencyData Protection
Every time a device powered by Intel boots,it starts secure.
STAY SECURESTART SECURE RUN SECURE
Intel security features run in the background, never disrupting user experience, so the devices run secure.
STAY SECURESTART SECURE RUN SECURE
If something goes wrong, it’s fixed in a secure environment, so you can stay secure.
START SECURE RUN SECURE STAY SECURE
Intel is working with its software partners,in critical areas...
...to strengthen software with hardware when it matters most, where it matters most.
Authentication
Boot Time Run Time Data Integrity
Remediation Recovery
Intel is making strong software stronger, withsecurity-enhanced hardware.
Just what the enterprise demands.
ANTI-MALWARE
Prevent viruses andmalware such as rootkits and
escalation-of-privilege attacks.
IDENTITY
Strengthen layers of authentication and passwords.
DATA PROTECTION
Encryption for sensistive business data in the cloud as
well as for online transactions.
RESILIENCY
Proactive securitymanagement, monitoring, andremediation regardless of the
operation state.
Learn more at
intel.com/enterprisesecurity
intelsecurity.com
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases,
including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect
performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be
claimed as the property of others.