Evaluating Microsoft Windows* 8 Securityon Intel® Architecture-based TabletsIntel CorporationJanuary 2013
Legal Notices    This Legal Notices slide should not be separated from the presentation, nor should individual slides be e...
Agenda• Background• Security and Manageability  Evaluation• Next steps• Summary
Why Microsoft Windows* 8 Now?         Intel IT continually evaluates                               We learned from our mig...
Platforms Tested                                                                                                          ...
Four Categories of Exploration          Device                                                 Improvements in         Sup...
Summary of Results                                             Windows* 8 and          Windows* 8 and                     ...
Summary of Results (cont.)                                          Windows* 8 and             Windows* 8 and             ...
Device Management• Intel® Core™ vPro™ processor-based  tablets have Intel® Active Management  Technology, which provides p...
Authentication• Intel® Core™ vPro™ processor-based  tablets use Intel® Identity Protection  Technology with public key  in...
Desktop/Legacy Applications       Supports execution of       desktop/traditional applications       • Enterprise can cont...
Protection for Lost or Stolen Devices     Intel® Core™ vPro™ processor-based     tablets support Intel® Anti-Theft     Tec...
Next Steps     • Investigate capabilities of       biometrics in Intel environment     • IT proofs-of-concept have started...
Summary     • Tablets running on Intel® architecture with Microsoft       Windows* 8 are enterprise-ready and consumer-fri...
Additional Resources      • Deploying Microsoft Windows 8        in the Enterprise paper      • Evaluating Microsoft Windo...
IT Annual Performance Report2012 Initiatives and 2013 Priorities              In-depth look at             Intel IT operat...
Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets
Upcoming SlideShare
Loading in …5
×

Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

1,211 views
1,108 views

Published on

Intel IT’s evaluation of Microsoft Windows* 8 on Intel® architecture-based tablets revealed new security and manageability benefits for IT and users

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,211
On SlideShare
0
From Embeds
0
Number of Embeds
19
Actions
Shares
0
Downloads
1
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Intel IT is currently evaluating the information security and privacy protection features of Intel® architecture-based tablets running Windows* 8 Enterprise.1 Our initial evaluations indicate that, together, Windows 8 and Intel® architecture provide a compelling platform for mobile devices in the enterprise, balancing enhanced information security capabilities with consumer-friendliness. We evaluated both an Intel® Atom™ processor-based tablet and an Intel® Core™ vPro™ processor-based tablet.This slide deck presents our findings.Take-aways:Tablets running on Intel® architecture with Microsoft Windows 8 Enterprise are both enterprise-ready and consumer-friendly.Intel IT benefits from enhanced device management and information security capabilities.Employees benefit from improved user experience.1 We tested Windows* 8 Enterprise. Other versions of Windows 8, such as Windows 8 Professional, will be made available to certain segments of Intel employees. For a discussion of Windows 8 Enterprise, refer to microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8/enterprise-edition.aspx.
  • This section: Provide background/motivation
  • Slide purpose: Set the stage for the evaluation.Since 2009, Intel IT has supported consumerization through our bring-your-own-device (BYOD) programs. To further these programs, we continually look for devices that increase employee productivity and can be managed as needed in the corporate environment. In preparation for the expansion of our support for consumerization, we evaluated two tablets for the enterprise, focusing on information security and manageability features and the benefits of these features within the enterprise environment.Our evaluation of Intel® architecture-based tablets running Windows* 8 is part of Intel IT’s ongoing research into new combinations of technology that balance employee productivity and job satisfaction, IT cost control, and manage risk to enterprise security.
  • Slide purpose: Describe what we testedWe tested Windows 8 running on two tablets with Intel® processors.A tablet with an Intel® Atom™ processorA tablet with a 3rd generation Intel® Core® vPro™ processorSpecifically, we investigated capabilities that would enhance information security associated with small form factor (SFF) devices. We also performed a baseline comparison to existing SFF solutions in the areas of device hardware security, OS-level security features, and application ecosystem security.Our approach involved an ecosystem review and a hands-on product evaluation. The ecosystem review gave us information about available products and solutions, while the hands-on testing allowed us to validate that the solutions provided the capabilities we need and improvements over existing solutions that have been implemented.
  • Slide purpose: Briefly discuss what we will do with the results of our evaluation.Based on the positive results of our evaluation, we intend to conduct several proofs of concept of both bring-your-own device and corporate-purchased Intel® architecture-based tablets running Windows* 8. We also plan to continue to investigate the capabilities of biometrics, and their corresponding privacy implications, in our security environment.
  • This slide represents the summary of the presentation.Based on an ecosystem review and a hands-on product evaluation, we determined that Intel® architecture-based tablets running Windows* 8 can enhance information security associated with devices with small form factors.We tested Windows 8 on Intel® architecture-based tablets and found security enhancements in four categories: flexible device management, hardware-assisted security through Intel® Identity Protection Technology, support for desktop/legacy enterprise applications, and the availability of Intel® Anti-Theft Technology. Overall, the tablets we tested balanced enterprise readiness with consumer-friendliness, with the Intel® Core™ vPro™ processor-based tablets offering the most security and manageability benefits to both the enterprise and users.
  • Slide purpose: promote the Annual Performance Report (APR)Talking Points:Every year over the past 10 years, our organization has taken the time to document our operations, strategies, and business value in an annual performance report for our organization.Over the past decade this document has helped communicate those priorities widely to many audiences.Inside our own IT organization and our IT employees showing them their impact to the business Inside our own business to our business stakeholders showing them the value of what we have done and how we have helped improved business value for IntelFinally, with the world and our peer IT organizations. We have found that by openly sharing what we are doing, we establish a dialogue that is mutually beneficial for our own organization , informally benchmarking and sharing key lessons, best practices and strategies while also helping to better understand and shape the direction of the industry through these partnershipsWe publish this document yearly, in January. You can find the 2010-2011 version on www.intel.com/IT.
  • Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets

    1. 1. Evaluating Microsoft Windows* 8 Securityon Intel® Architecture-based TabletsIntel CorporationJanuary 2013
    2. 2. Legal Notices This Legal Notices slide should not be separated from the presentation, nor should individual slides be extracted from this presentation. Intel ® Identity Protection Technology (Intel® IPT): No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd Generation Intel® Core™ processor enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com. Intel® Anti-Theft Technology (Intel® AT): No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software, and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro. Security features enabled by Intel® AMT require an enabled chipset, network hardware and software and a corporate network connection. Intel® AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more info, see www.intel.com/technology/manage/iamt Intel may make changes to specifications and product descriptions at any time, without notice. This presentation is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estopel or otherwise, to any intellectual property rights is granted herein. Intel, the Intel logo, Intel Atom, Intel Core, and Intel Core vPro are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others.2 Copyright © 2013, Intel Corporation. All rights reserved.
    3. 3. Agenda• Background• Security and Manageability Evaluation• Next steps• Summary
    4. 4. Why Microsoft Windows* 8 Now? Intel IT continually evaluates We learned from our migration to new devices that can increase Windows* 7 that the combination employee productivity and be of new software and new hardware managed as needed in the can bring significant benefits to the corporate environment. enterprise—both employees and IT. Intel IT continually searches for products and technologies that balance employee productivity, cost control, and enterprise risk.* Other names and brands may be claimed as the property of others.4 Copyright © 2013, Intel Corporation. All rights reserved.
    5. 5. Platforms Tested Intel® vPro Technology Processor RAM Chipset Graphics SATA Support Tablet designed with an Intel® Atom™ processor running Microsoft Windows* 8 Enterprise1 Intel® Atom™ 2-GB LPDDR2 System on Imagination eMMC Not applicable processor 800 MHz chip Technologies* 64 GB Z2760 system PowerVR* on chip SGX545 1.8 GHz Tablet designed with a 3rd generation Intel® Core™ vPro™ processor running Microsoft Windows* 8 Enterprise Intel® Core™ 4-GB DDR3 Intel® QM77 Intel® HD mSATA Intel® Active i5-3427U 1600 MHz Express Graphics 4000 128 GB Management processor Chipset Technology 8.0 2.3 GHz1 We tested Windows* 8 Enterprise. Other versions of Windows 8, such as Windows 8 Professional, will be made available to certain segments of Intel employees. For a discussion of Windows 8 Enterprise, refer to: http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8/enterprise-edition.aspx For the rest of this presentation, we will refer to Windows 8 Enterprise as Windows 8.* Other names and brands may be claimed as the property of others.5 Copyright © 2013, Intel Corporation. All rights reserved.
    6. 6. Four Categories of Exploration Device Improvements in Support Protection for management authentication for desktop/legacy lost or stolen applications devices Intel® architecture-based tablets running Windows* 8 matched or exceeded the security capabilities of those currently deployed.* Other names and brands may be claimed as the property of others.6 Copyright © 2013, Intel Corporation. All rights reserved.
    7. 7. Summary of Results Windows* 8 and Windows* 8 and Intel® Atom™ Intel® Core™ vPro™ Benefit of Windows* 8 Enterprise Capability Processor Processor and Intel® Architecture Domain join and Enhanced authentication and control; group policy more policies available Windows 8 Enterprise and Intel architecture offers simplified Manageability In-band and deployments, reduced infrastructure, In-band remote out-of-band remote and recovery in all power states management management Support for Enhanced security via plug-ins using third-party desktop mode browser add-ons Support for multiple/strong Simplified user experience with authentication enhanced enterprise security methods (e.g. biometrics)* Other names and brands may be claimed as the property of others.7 Copyright © 2013, Intel Corporation. All rights reserved.
    8. 8. Summary of Results (cont.) Windows* 8 and Windows* 8 and Intel® Atom™ Intel® Core™ vPro™ Benefit of Windows* 8 Enterprise Capability Processor Processor and Intel® Architecture One-time Intel Core vPro processor-based tablets password (OTP) Not embedded in have embedded tokens HW, but available in OTP is embedded in HW SW Authentication using certificates Strong authentication using hardware to tie device to Using Intel® Identity encryption the OS Protection Technology with public key infrastructure Support for Ability to continue to benefit from previous desktop/traditional investment applications Device theft Higher confidence protection of corporate recovery and Remote wipe upon assets; remote lock and remote unlock if remediation user request using Using Intel® Anti-Theft the device is found/returned Microsoft Exchange Technology ActiveSync** Other names and brands may be claimed as the property of others.8 Copyright © 2013, Intel Corporation. All rights reserved.
    9. 9. Device Management• Intel® Core™ vPro™ processor-based tablets have Intel® Active Management Technology, which provides power state agnostic remote management• Both Intel® Atom™ and Core vPro processor-based tablets can integrate with centralized management capabilities, including domain join and group policy enforcement• Simplified deployment for IT and reduced infrastructure for lower TCO Intel® architecture-based tablets running Windows* 8 provide enhanced security via device management capabilities.* Other names and brands may be claimed as the property of others.9 Copyright © 2013, Intel Corporation. All rights reserved.
    10. 10. Authentication• Intel® Core™ vPro™ processor-based tablets use Intel® Identity Protection Technology with public key infrastructure to tie device to the OS for strong authentication using hardware encryption• Both Intel® Atom™ and Intel® Core vPro processor-based tablets support multiple/strong authentication options for a better user experience and enhanced enterprise security Intel® architecture-based tablets running Windows* 8 enable IT to increase security while maintaining a great user experience.* Other names and brands may be claimed as the property of others.10 Copyright © 2013, Intel Corporation. All rights reserved.
    11. 11. Desktop/Legacy Applications Supports execution of desktop/traditional applications • Enterprise can continue to benefit from previous investment Easy-to-add third-party security plug-ins using desktop mode for enhanced security • Examples include anti-malware or Host Intrusion Prevention (HIPs) Intel® architecture-based tablets running Windows* 8 support desktop/traditional applications and add-on security controls.* Other names and brands may be claimed as the property of others.11 Copyright © 2013, Intel Corporation. All rights reserved.
    12. 12. Protection for Lost or Stolen Devices Intel® Core™ vPro™ processor-based tablets support Intel® Anti-Theft Technology (Intel® AT): • Remote disable or “lock” with “check-in time-out” from the network or through a web console • Device can be offline and disable/lock still functions • Remote restore or “unlock” if the device is found/returned Addition of Intel AT to Intel® Core™ vPro™ processor-based tablets can help protect information and support device recovery.Intel AT is provided by Intel but there is a charge of $29.99 per year for an individual copy. It can be purchased here: http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=3673716&CatId=749912 Copyright © 2013, Intel Corporation. All rights reserved.
    13. 13. Next Steps • Investigate capabilities of biometrics in Intel environment • IT proofs-of-concept have started – Bring-your-own device Windows* 8 Pro – Corporate-owned tablets • IT Windows* 8 Deployment – Accelerated deployment, leveraging Windows 7 migration learning – Phased approach: Windows 8 will be the default OS by end of Q2’2013* Other names and brands may be claimed as the property of others.13 Copyright © 2013, Intel Corporation. All rights reserved.
    14. 14. Summary • Tablets running on Intel® architecture with Microsoft Windows* 8 are enterprise-ready and consumer-friendly • Intel IT benefits from enhanced device management and information security capabilities • Employees benefit from improved user experience* Other names and brands may be claimed as the property of others.14 Copyright © 2013, Intel Corporation. All rights reserved.
    15. 15. Additional Resources • Deploying Microsoft Windows 8 in the Enterprise paper • Evaluating Microsoft Windows 8 Security on Intel Architecture Tablets brief • Inside IT Radio Show series Learn more about Intel IT’s initiatives at www.intel.com/IT* Other names and brands may be claimed as the property of others.15 Copyright © 2013, Intel Corporation. All rights reserved.
    16. 16. IT Annual Performance Report2012 Initiatives and 2013 Priorities In-depth look at Intel IT operations and priorities Shares the impact and value Intel IT creates for Intel Read the Performance Report at: www.intel.com/go/ITAnnualReport16 Copyright © 2013, Intel Corporation. All rights reserved.

    ×