2Challenges to securityNIST, HIPAA,PCI-DSS, SOXATTACKERSHAVE EVOLVEDTECHNOLOGYARCHITECTUREHAS CHANGEDCONSUMERIZATION OF ITINCREASED REGULATIONSecurity challenges are growingmore complex.
3Understanding the risksCLIENT ACCESSGrowing diversity ofclient access devicesincreases the risk ofillegitimate access byhackers or cyber-criminalsVIRTUALWORKLOADSSecuritymanagement toolsare challenged bydata centervirtualizationAPIsExpanded attacksurface created asapps are shared viaAPIs from cloudto mobile
4Protect yourselfCLIENT SECURITYHelp protect client data so onlyauthorized users can accessthe cloudTRUSTED COMPUTE POOLSBuild trust and transparency incloud infrastructureAPPLICATION API CONTROLManage APIs at the networkedge where application servicesare consumed and exposed withpartners, devices, and developers
5Secure your clients Intel® Identity ProtectionTechnology (Intel IPT) —Hardware-based two-factorauthentication for clientaccess McAfee Cloud IdentityManager — Federatedsingle sign-on to cloudapplications McAfee Deep Defender —Monitors and roots outmalware attacks below theoperating systemProtection by Intel and McAfee11 No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd gen Intel® Core™ processorenabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or anyresulting damages. For more information, visit ipt.intel.com.
6It’s all about trustProtect your data and workloads by establishingtrusted compute pools using Intel® TrustedExecution Technology (Intel TXT).• Provide a foundation for trust in cloud infrastructureby measuring integrity of virtualized infrastructure• Protect data and workloads by deploying them ontrusted virtualized infrastructure• Create transparency to enable audit and governancein cloud deploymentsIntelTXTIt’s all about trustIntelTXT11 No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® VirtualizationTechnology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXTalso requires the system to contain a TPM v1.s. For more information, visit intel.com/technology/security.
7Application LayerSecurityIntel ExpresswayService Gateway.Software appliance thatacts as an API proxy wheresecurity policy is enforced,legacy applications & dataare orchestrated, andmobile APIs areexposed todevelopercommunities.
8Move to the cloud with confidenceIntel hardware-based security helpsprotect your infrastructure so youcan feel more confident aboutmoving to the cloud. More secure client access Trusted compute pools API controls at the edge
9We’ll help youget startedDOWNLOAD NOW!Download the Cloud Security Planning Guide anddiscover valuable information on how to protectYOUR data, from device to data center.It is no longer the case thatsecurity around the perimeter willhold. You have to assume thatcompromise is inevitable in anycompute model. In order tomanage the risk you have to setup a more granular trust model.http://www.intel.com/content/www/us/en/cloud-computing/cloud-security-checklist-planning-guide.htmlMalcolm HarkinsIntel Vice President of Information Technology Groupand Chief Information Security Officer