SECURITYvs.SPEED
DATAPROTECTIONTECHNOLOGY
1.PonemonInstitute."2013StateoftheEndpoint."SponsoredbyLumension.December2012
2....
Upcoming SlideShare
Loading in...5
×

How Intel Security Protects Enterprise Data - Infographic

4,299

Published on

Protecting your enterprise doesn’t have to mean sacrificing speed, scalability, and user experience. Check out this infographic to see how Intel speeds up software by building security tools right into the hardware.

Published in: Technology, Business

How Intel Security Protects Enterprise Data - Infographic

  1. 1. SECURITYvs.SPEED DATAPROTECTIONTECHNOLOGY 1.PonemonInstitute."2013StateoftheEndpoint."SponsoredbyLumension.December2012 2.“2012CostofaDataBreach.”May2013.BenchmarkresearchsponsoredbySymantec.IndependentlyconductedbyPonemonInstituteLLC 3.Venafi."PonemonCostofFailedTrustReport."http://www.venafi.com/collateral/2013-02-ponemon-report Yourcustomerdata,youremployee data,yourpartnerdata,andyour enterprisedata— importantstuff. Butsecuringitcomesataprice: Efficiency&Experience Whenyou’resuccessfulinward- ingoffthreats,that’sgreat!Butit seemsliketheonlythingpeople noticeishowfasttheirstuffis moving—orworse–howslow. Raisingefficiencyalso raisestherisk.Andnow you’regettingattention forbeingthepersonre- sponsibleforabreach. Nowyou’reoutofcompliance.Your linesofbusinesswillhaveyourneck ifit’stooslow.Theauthoritieswill haveyourneckifit’snotsecure. HEY! PICKUP THEPACE! SECURITY EFFICIENCY SECURITY EFFICIENCY SECURITY EFFICIENCY Dang... You’refacedwithacrummychoice:Moveslowly,orgambleyour security.Thisisalose/losesituation. Findoutmoreatintel.com/enterprisesecurity intelsecurity.com Customer data Employee data Enterprise data Partner data Security software DUD High-gradesecurity.Thenecessary speedstokeepfolkshappy.Andthe abilitytocompetemoreeffectively. Withallthese,youcanhavepeaceof mindfortheEnterprise. Intel®DataProtectionTechnology withAES-NIallowsyoursoftware toencryptyourdatawithmore efficiencyandbetterperfor- mance.Withouttheneedforextra accelerators. Intel®DataProtectionTechnology withSecureKeygivesyoubetter keysandsimulations.The on-boarddigitalrandomnumber generatorsolvestheproblemof limitedentropy. Intel®DataProtectionTechnology withcryptoperformanceboost givesyoursoftwaretheabilityto encryptdatainmotion.Makedata transactionssecure.Reduce overheadofauthentication pprotocolsthroughmoreefficient CPUprocesses. SoftwareandworkloadsusedinperformancetestsmayhavebeenoptimizedforperformanceonlyonIntelmicroprocessors.Performancetests,suchasSYSmarkandMobileMark,aremeasuredusingspeciccomputersystems,components,software,operationsand functions.Anychangetoanyofthosefactorsmaycausetheresultstovary.Youshouldconsultotherinformationandperformance!teststoassistyouinfullyevaluatingyourcontemplatedpurchases,includingtheperformanceofthatproductwhencombinedwith otherpotherproducts.InteldoesnotcontrolorauditthedesignorimplementationofthirdpartybenchmarkdataorWebsitesreferencedinthisdocument.IntelencouragesallofitscustomerstovisitthereferencedWebsitesorotherswheresimilarperformancebenchmark dataarereportedandconrmwhetherthereferencedbenchmarkdataareaccurateandreectperformanceofsystemsavailableforpurchase.Formoreinformationgotohttp://www.intel.com/performance.Intel,theIntellogo,andtheIntelSecuritylogoare trademarksofIntelCorporationintheU.S.and/orothercountries.TheMcAfeelogoisatrademarkorregisteredtrademarkofMcAfee,Inc.intheUnitedStatesandothercountries.Copyright©2014IntelCorporation.Allrightsreserved. Condenceinnetworksecuritycontinuesto decline.46%ofrespondentsdonotbelieve theirITnetworkismoresecurenowthanit wasayearago. Averageorganizationalcostofadata breachin2012was$5.4million. APonemonanalysisestimates that“failedkeyandcerticate managementthreatensevery globalenterprisewithpoten- tialcostexposureofalmost US$400million.” Now,theEnterpriseisbetterprotected.Itcansetthepaceforinnovationandefficiency. Anditcanstillbecompliant. vs. AND HARDWARESOFTWARE

×