How Intel Security Protects Enterprise Data - Infographic

  • 3,639 views
Uploaded on

Protecting your enterprise doesn’t have to mean sacrificing speed, scalability, and user experience. Check out this infographic to see how Intel speeds up software by building security tools right …

Protecting your enterprise doesn’t have to mean sacrificing speed, scalability, and user experience. Check out this infographic to see how Intel speeds up software by building security tools right into the hardware.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
3,639
On Slideshare
0
From Embeds
0
Number of Embeds
5

Actions

Shares
Downloads
118
Comments
0
Likes
42

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. SECURITYvs.SPEED DATAPROTECTIONTECHNOLOGY 1.PonemonInstitute."2013StateoftheEndpoint."SponsoredbyLumension.December2012 2.“2012CostofaDataBreach.”May2013.BenchmarkresearchsponsoredbySymantec.IndependentlyconductedbyPonemonInstituteLLC 3.Venafi."PonemonCostofFailedTrustReport."http://www.venafi.com/collateral/2013-02-ponemon-report Yourcustomerdata,youremployee data,yourpartnerdata,andyour enterprisedata— importantstuff. Butsecuringitcomesataprice: Efficiency&Experience Whenyou’resuccessfulinward- ingoffthreats,that’sgreat!Butit seemsliketheonlythingpeople noticeishowfasttheirstuffis moving—orworse–howslow. Raisingefficiencyalso raisestherisk.Andnow you’regettingattention forbeingthepersonre- sponsibleforabreach. Nowyou’reoutofcompliance.Your linesofbusinesswillhaveyourneck ifit’stooslow.Theauthoritieswill haveyourneckifit’snotsecure. HEY! PICKUP THEPACE! SECURITY EFFICIENCY SECURITY EFFICIENCY SECURITY EFFICIENCY Dang... You’refacedwithacrummychoice:Moveslowly,orgambleyour security.Thisisalose/losesituation. Findoutmoreatintel.com/enterprisesecurity intelsecurity.com Customer data Employee data Enterprise data Partner data Security software DUD High-gradesecurity.Thenecessary speedstokeepfolkshappy.Andthe abilitytocompetemoreeffectively. Withallthese,youcanhavepeaceof mindfortheEnterprise. Intel®DataProtectionTechnology withAES-NIallowsyoursoftware toencryptyourdatawithmore efficiencyandbetterperfor- mance.Withouttheneedforextra accelerators. Intel®DataProtectionTechnology withSecureKeygivesyoubetter keysandsimulations.The on-boarddigitalrandomnumber generatorsolvestheproblemof limitedentropy. Intel®DataProtectionTechnology withcryptoperformanceboost givesyoursoftwaretheabilityto encryptdatainmotion.Makedata transactionssecure.Reduce overheadofauthentication pprotocolsthroughmoreefficient CPUprocesses. SoftwareandworkloadsusedinperformancetestsmayhavebeenoptimizedforperformanceonlyonIntelmicroprocessors.Performancetests,suchasSYSmarkandMobileMark,aremeasuredusingspeciccomputersystems,components,software,operationsand functions.Anychangetoanyofthosefactorsmaycausetheresultstovary.Youshouldconsultotherinformationandperformance!teststoassistyouinfullyevaluatingyourcontemplatedpurchases,includingtheperformanceofthatproductwhencombinedwith otherpotherproducts.InteldoesnotcontrolorauditthedesignorimplementationofthirdpartybenchmarkdataorWebsitesreferencedinthisdocument.IntelencouragesallofitscustomerstovisitthereferencedWebsitesorotherswheresimilarperformancebenchmark dataarereportedandconrmwhetherthereferencedbenchmarkdataareaccurateandreectperformanceofsystemsavailableforpurchase.Formoreinformationgotohttp://www.intel.com/performance.Intel,theIntellogo,andtheIntelSecuritylogoare trademarksofIntelCorporationintheU.S.and/orothercountries.TheMcAfeelogoisatrademarkorregisteredtrademarkofMcAfee,Inc.intheUnitedStatesandothercountries.Copyright©2014IntelCorporation.Allrightsreserved. Condenceinnetworksecuritycontinuesto decline.46%ofrespondentsdonotbelieve theirITnetworkismoresecurenowthanit wasayearago. Averageorganizationalcostofadata breachin2012was$5.4million. APonemonanalysisestimates that“failedkeyandcerticate managementthreatensevery globalenterprisewithpoten- tialcostexposureofalmost US$400million.” Now,theEnterpriseisbetterprotected.Itcansetthepaceforinnovationandefficiency. Anditcanstillbecompliant. vs. AND HARDWARESOFTWARE