How Intel Security Gives the Enterprise Resiliency - Infographic

4,258 views
4,132 views

Published on

Resiliency means being able to bend and not break, to fix problems as they arise. Unfortunately, security software can only go so far in fending off attacks on firmware and the operating system. This infographic lays out Intel’s plan for building defenses right into the hardware—right into the infrastructure of your system.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
4,258
On SlideShare
0
From Embeds
0
Number of Embeds
2,104
Actions
Shares
0
Downloads
16
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

How Intel Security Gives the Enterprise Resiliency - Infographic

  1. 1. Findoutmoreatintel.com/enterprisesecurity intelsecurity.com SoftwareandworkloadsusedinperformancetestsmayhavebeenoptimizedforperformanceonlyonIntelmicroprocessors.Performancetests,suchasSYSmarkandMobileMark,aremeasuredusingspeciccomputersystems,components,software,operationsand functions.Anychangetoanyofthosefactorsmaycausetheresultstovary.Youshouldconsultotherinformationandperformance!teststoassistyouinfullyevaluatingyourcontemplatedpurchases,includingtheperformanceofthatproductwhencombinedwith otherpotherproducts.InteldoesnotcontrolorauditthedesignorimplementationofthirdpartybenchmarkdataorWebsitesreferencedinthisdocument.IntelencouragesallofitscustomerstovisitthereferencedWebsitesorotherswheresimilarperformancebenchmark dataarereportedandconrmwhetherthereferencedbenchmarkdataareaccurateandreectperformanceofsystemsavailableforpurchase.Formoreinformationgotohttp://www.intel.com/performance.Intel,theIntellogo,andtheIntelSecuritylogoaretrade- mamarksofIntelCorporationintheU.S.and/orothercountries.TheMcAfeelogoisatrademarkorregisteredtrademarkofMcAfee,Inc.intheUnitedStatesandothercountries.Copyright©2014IntelCorporation.Allrightsreserved. Withhardware-enhancedsecurity,your enterpriseishealthier,moreefficient, andmoreresilienttothreats. EnterpriseResiliency ...butwithagrowingoperationcomesgrowing complexity. Keepingtheenterprise safeagainstattacksand mishapsishardenough... Makesecuritysoftwarestronger,andsystemsmoreresilient, bybuildingsecurityintothehardware:rightintotheinfrastructure. Intelisbuildingsecuritycapabilitiesrightintothe chipset-theplatformsthemselves. HERE’SINTEL’SPHILOSOPHY INTELRESILIENCY BADSTUFFHAPPENS Theindividualcomputingdeviceisthenewperimeter.Allhackers needisonevulnerableperson,andyourentireorganizationisatrisk, observesGreenSQL’sDavidMaman.5 It’snolongeraquestionofIF,butWHEN somethinggoeswrong.It’scriticalthatwhen thingsgowrong,theyare xedquickly. Evenduringmaintenanceandupdates,attackers cansneakpastsoftwaredefenses. 71%ofemployeesdon’tobeypolicies.4 52%ofobservedmalwarebehaviors focusedonevadingsecurityoranalysis, comparedtoonly15%focusedon hackinganddatatheft.3 54%oforganizationsresearchedhadatleast onepotentialdatalossincident.2 Cleanupiscostly.Reimagingcantake vehourspermachine,derailingboththeITtechnicianandtheenduserfrommoreproductivework. Asstealthtechniquesincreaseincomplexity,thesecleanupcostscanonlyincrease.Becausesomemalwarecanreincarnateafterareimage, themostcautiousapproachinusetodayistoreplaceinfectedcomputers-ahighcapitalandproductivitycost.1 Securitysoftware,whileeffectiveinreducing threats,cansometimesoverlookthetruesinister intentions,andleaveasystemvulnerable. FIND FIX Ifyourrmwaregoesunguarded,badguyscan infecttheentireenterprisethroughtheBIOS infrastructurethatoftengetstakenforgranted. 1.McAfeeandIntel.“TheNewRealityofStealthCrimeware.”2011.http://www.mcafee.com/us/resources/white-papers/wp-reality-of-stealth-crimeware.pdf 2.CheckPoint.“2013InternetSecurityReport.”http://www.checkpoint.com/campaigns/security-report/ 3.PaloAltoNetworks.“TheModernMalwareReview,AnalysisofNewandEvasiveMalwareinLiveEnterpriseNetworks.”1stEdition.March2013 4.Cisco.“CiscoSecurity:AppliedIntelligenceforaRiskyWorld.”2013.http://www.cisco.com/en/US/solutions/collateral/ns1015/ns1238/info_graphics_c82-727889.pdf 5.5.InfosecurityMagazine.“Comment:CybercrimeComestoaSiteNearYou.”November2013.http://www.infosecurity-magazine.com/view/35729/comment-cybercrime-comes-to-a-site-near-you/ Whentheverysystemyourenterprisereliesonisbreached,howcan yoursecuritysoftwareeffectivelygetyoubackonyourfeet? Youcanrestoreplatform rmwareandBIOS toaknown-goodcongurationfromthe manufacturer-withnothingmorethataUSBcable. Whenyouneedtoupdatedevice rmware,Intel®PlatformProtection TechnologywithBIOSGuardhelpsto keepshadythingsoutofthemix. Intel® Intel®Securitybolstersthe protectionoftheoperatingsystem andtheapplicationsitsupports. FortifyyourFirmwareandpreciousbase-level operatingresourcesfromattackswith Intel®DeviceProtectionwithBootGuard. Andifthereisanattackonwhatyoucan’tsee, havingsecuritybuiltintothehardware infrastructurecangiveyouvisibilityintotheattack whilealsotriggeringyourdefenses. FREEZE Whensomethinggoesawry,youcaneffectively nd,freeze,and xtheproblemwith reduceddowntime-gettingyoursystems,devices,andusersbackupandrunningquickly.

×