How Intel Security Is Changing Enterprise Protection

  • 1,061 views
Uploaded on

It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you …

It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you also have to stay within the boundaries of compliance and policy. Here's Intel's philosophy: make security software stronger, with strong hardware. See how from boot time to run time, Intel’s hardware fortifies the security of the enterprise.

Learn more at http://intel.com/enterprisesecurity.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,061
On Slideshare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
6
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. SECUR TY ENTERPRISE Stronger with Intel
  • 2. You understand enterprise security, but it can be a logistical nightmare. AAAAAAAGH!
  • 3. But it’s a balancing act between security and freedom. USER FREEDOM ENTERPRISE ASSETS
  • 4. Software is your greatest ally against attacks, but the attackers are getting better. Identity Protection Policy & Compliance Malware Protection Network Security Endpoint Security Data Protection Resiliency Privacy
  • 5. Threats are on the rise, and the complexity of the attacks are more sophisticated. 232 million identities exposed in 2011 globally. That would equal almost 75% of the US population at the time.¹ 232 MILLION $5.5M is the average cost of a company breach. Within one day, that’s $3,819.00 per minute.³ $5.5M Mobile vulnerabilities up 3,300% (10,900) in the last six months.² IDENTITY MOBILE ATTACKS BREACH COST $ ! ¹Symantec Internet Threat Security Report, Volume 17. May 2012 ²Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013 ³Symantec, "Internet Security Threat Report: 2011 Trends," April 2012 http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf
  • 6. How do you improve security and increase user freedom? FREEDOMSECURITY
  • 7. Here is Intel’s philosophy: Make security software stronger... with hardware. SECURITY SOFTWARE INTEL® HARDWARE
  • 8. Intel is building security into the computing foundation, directly on the silicon, extending and enhancing the traditional protection offered by software alone.
  • 9. Here is where Intel's hardware assisted security can help. Identity Anti-Malware ResiliencyData Protection
  • 10. Every time a device powered by Intel boots, it starts secure. STAY SECURESTART SECURE RUN SECURE
  • 11. Intel security features run in the background, never disrupting user experience, so the devices run secure. STAY SECURESTART SECURE RUN SECURE
  • 12. If something goes wrong, it’s fixed in a secure environment, so you can stay secure. START SECURE RUN SECURE STAY SECURE
  • 13. Intel is working with its software partners, in critical areas...
  • 14. ...to strengthen software with hardware when it matters most, where it matters most. Authentication Boot Time Run Time Data Integrity Remediation Recovery
  • 15. Intel is making strong software stronger, with security-enhanced hardware. Just what the enterprise demands. ANTI-MALWARE Prevent viruses and malware such as rootkits and escalation-of-privilege attacks. IDENTITY Strengthen layers of authentication and passwords. DATA PROTECTION Encryption for sensistive business data in the cloud as well as for online transactions. RESILIENCY Proactive security management, monitoring, and remediation regardless of the operation state.
  • 16. Learn more at intel.com/enterprisesecurity intelsecurity.com Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others.