How Intel Security Is Changing Enterprise Protection


Published on

It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you also have to stay within the boundaries of compliance and policy. Here's Intel's philosophy: make security software stronger, with strong hardware. See how from boot time to run time, Intel’s hardware fortifies the security of the enterprise.

Learn more at

Published in: Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

How Intel Security Is Changing Enterprise Protection

  1. 1. SECUR TY ENTERPRISE Stronger with Intel
  2. 2. You understand enterprise security, but it can be a logistical nightmare. AAAAAAAGH!
  3. 3. But it’s a balancing act between security and freedom. USER FREEDOM ENTERPRISE ASSETS
  4. 4. Software is your greatest ally against attacks, but the attackers are getting better. Identity Protection Policy & Compliance Malware Protection Network Security Endpoint Security Data Protection Resiliency Privacy
  5. 5. Threats are on the rise, and the complexity of the attacks are more sophisticated. 232 million identities exposed in 2011 globally. That would equal almost 75% of the US population at the time.¹ 232 MILLION $5.5M is the average cost of a company breach. Within one day, that’s $3,819.00 per minute.³ $5.5M Mobile vulnerabilities up 3,300% (10,900) in the last six months.² IDENTITY MOBILE ATTACKS BREACH COST $ ! ¹Symantec Internet Threat Security Report, Volume 17. May 2012 ²Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013 ³Symantec, "Internet Security Threat Report: 2011 Trends," April 2012
  6. 6. How do you improve security and increase user freedom? FREEDOMSECURITY
  7. 7. Here is Intel’s philosophy: Make security software stronger... with hardware. SECURITY SOFTWARE INTEL® HARDWARE
  8. 8. Intel is building security into the computing foundation, directly on the silicon, extending and enhancing the traditional protection offered by software alone.
  9. 9. Here is where Intel's hardware assisted security can help. Identity Anti-Malware ResiliencyData Protection
  10. 10. Every time a device powered by Intel boots, it starts secure. STAY SECURESTART SECURE RUN SECURE
  11. 11. Intel security features run in the background, never disrupting user experience, so the devices run secure. STAY SECURESTART SECURE RUN SECURE
  12. 12. If something goes wrong, it’s fixed in a secure environment, so you can stay secure. START SECURE RUN SECURE STAY SECURE
  13. 13. Intel is working with its software partners, in critical areas...
  14. 14. strengthen software with hardware when it matters most, where it matters most. Authentication Boot Time Run Time Data Integrity Remediation Recovery
  15. 15. Intel is making strong software stronger, with security-enhanced hardware. Just what the enterprise demands. ANTI-MALWARE Prevent viruses and malware such as rootkits and escalation-of-privilege attacks. IDENTITY Strengthen layers of authentication and passwords. DATA PROTECTION Encryption for sensistive business data in the cloud as well as for online transactions. RESILIENCY Proactive security management, monitoring, and remediation regardless of the operation state.
  16. 16. Learn more at Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.