How Intel Security Gives the Enterprise Resiliency - Infographic

  • 3,341 views
Uploaded on

Resiliency means being able to bend and not break, to fix problems as they arise. Unfortunately, security software can only go so far in fending off attacks on firmware and the operating system. This …

Resiliency means being able to bend and not break, to fix problems as they arise. Unfortunately, security software can only go so far in fending off attacks on firmware and the operating system. This infographic lays out Intel’s plan for building defenses right into the hardware—right into the infrastructure of your system.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
3,341
On Slideshare
0
From Embeds
0
Number of Embeds
4

Actions

Shares
Downloads
11
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Findoutmoreatintel.com/enterprisesecurity intelsecurity.com SoftwareandworkloadsusedinperformancetestsmayhavebeenoptimizedforperformanceonlyonIntelmicroprocessors.Performancetests,suchasSYSmarkandMobileMark,aremeasuredusingspeciccomputersystems,components,software,operationsand functions.Anychangetoanyofthosefactorsmaycausetheresultstovary.Youshouldconsultotherinformationandperformance!teststoassistyouinfullyevaluatingyourcontemplatedpurchases,includingtheperformanceofthatproductwhencombinedwith otherpotherproducts.InteldoesnotcontrolorauditthedesignorimplementationofthirdpartybenchmarkdataorWebsitesreferencedinthisdocument.IntelencouragesallofitscustomerstovisitthereferencedWebsitesorotherswheresimilarperformancebenchmark dataarereportedandconrmwhetherthereferencedbenchmarkdataareaccurateandreectperformanceofsystemsavailableforpurchase.Formoreinformationgotohttp://www.intel.com/performance.Intel,theIntellogo,andtheIntelSecuritylogoaretrade- mamarksofIntelCorporationintheU.S.and/orothercountries.TheMcAfeelogoisatrademarkorregisteredtrademarkofMcAfee,Inc.intheUnitedStatesandothercountries.Copyright©2014IntelCorporation.Allrightsreserved. Withhardware-enhancedsecurity,your enterpriseishealthier,moreefficient, andmoreresilienttothreats. EnterpriseResiliency ...butwithagrowingoperationcomesgrowing complexity. Keepingtheenterprise safeagainstattacksand mishapsishardenough... Makesecuritysoftwarestronger,andsystemsmoreresilient, bybuildingsecurityintothehardware:rightintotheinfrastructure. Intelisbuildingsecuritycapabilitiesrightintothe chipset-theplatformsthemselves. HERE’SINTEL’SPHILOSOPHY INTELRESILIENCY BADSTUFFHAPPENS Theindividualcomputingdeviceisthenewperimeter.Allhackers needisonevulnerableperson,andyourentireorganizationisatrisk, observesGreenSQL’sDavidMaman.5 It’snolongeraquestionofIF,butWHEN somethinggoeswrong.It’scriticalthatwhen thingsgowrong,theyare xedquickly. Evenduringmaintenanceandupdates,attackers cansneakpastsoftwaredefenses. 71%ofemployeesdon’tobeypolicies.4 52%ofobservedmalwarebehaviors focusedonevadingsecurityoranalysis, comparedtoonly15%focusedon hackinganddatatheft.3 54%oforganizationsresearchedhadatleast onepotentialdatalossincident.2 Cleanupiscostly.Reimagingcantake vehourspermachine,derailingboththeITtechnicianandtheenduserfrommoreproductivework. Asstealthtechniquesincreaseincomplexity,thesecleanupcostscanonlyincrease.Becausesomemalwarecanreincarnateafterareimage, themostcautiousapproachinusetodayistoreplaceinfectedcomputers-ahighcapitalandproductivitycost.1 Securitysoftware,whileeffectiveinreducing threats,cansometimesoverlookthetruesinister intentions,andleaveasystemvulnerable. FIND FIX Ifyourrmwaregoesunguarded,badguyscan infecttheentireenterprisethroughtheBIOS infrastructurethatoftengetstakenforgranted. 1.McAfeeandIntel.“TheNewRealityofStealthCrimeware.”2011.http://www.mcafee.com/us/resources/white-papers/wp-reality-of-stealth-crimeware.pdf 2.CheckPoint.“2013InternetSecurityReport.”http://www.checkpoint.com/campaigns/security-report/ 3.PaloAltoNetworks.“TheModernMalwareReview,AnalysisofNewandEvasiveMalwareinLiveEnterpriseNetworks.”1stEdition.March2013 4.Cisco.“CiscoSecurity:AppliedIntelligenceforaRiskyWorld.”2013.http://www.cisco.com/en/US/solutions/collateral/ns1015/ns1238/info_graphics_c82-727889.pdf 5.5.InfosecurityMagazine.“Comment:CybercrimeComestoaSiteNearYou.”November2013.http://www.infosecurity-magazine.com/view/35729/comment-cybercrime-comes-to-a-site-near-you/ Whentheverysystemyourenterprisereliesonisbreached,howcan yoursecuritysoftwareeffectivelygetyoubackonyourfeet? Youcanrestoreplatform rmwareandBIOS toaknown-goodcongurationfromthe manufacturer-withnothingmorethataUSBcable. Whenyouneedtoupdatedevice rmware,Intel®PlatformProtection TechnologywithBIOSGuardhelpsto keepshadythingsoutofthemix. Intel® Intel®Securitybolstersthe protectionoftheoperatingsystem andtheapplicationsitsupports. FortifyyourFirmwareandpreciousbase-level operatingresourcesfromattackswith Intel®DeviceProtectionwithBootGuard. Andifthereisanattackonwhatyoucan’tsee, havingsecuritybuiltintothehardware infrastructurecangiveyouvisibilityintotheattack whilealsotriggeringyourdefenses. FREEZE Whensomethinggoesawry,youcaneffectively nd,freeze,and xtheproblemwith reduceddowntime-gettingyoursystems,devices,andusersbackupandrunningquickly.