Intel Enterprise Security - Infographic


Published on

It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you also have to stay within the boundaries of compliance and policy. Here's Intel's philosophy: make security software stronger, with strong hardware. See how from boot time to run time, Intel’s hardware fortifies the security of the enterprise.

Learn more at

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Intel Enterprise Security - Infographic

  1. 1. $5.5 MIL Strong security software is made stronger when working directly with Intel® hardware. SECURITY SOFTWARE INTEL® HARDWARE IDENTITY PROTECTION Pertains to strengthening multi-level authentication and protecting passwords; a simple username and password solution is no longer enough. Preventing viruses and malware such as rootkits and escalation-of-privilege attacks on the hardware before the OS is up and running. Encryption for sensitive business data in the cloud as well as for online transactions, and mitigating the risk of lost or stolen intelligent devices. Extends across all supported hardware with powerful remote support capabilities for proactive security management, monitoring, and remediation – regardless of the operational state. ANTI-MALWARE DATA PROTECTION RESILIENCY IDENTITY Identities exposed in 2011 globally. That equalled almost 75% of the US population at the time.1 Mobile vulnerabilities up 3,300% (10,900) in the last six months.2 Average cost to company of a breach. Within one day, that’s $3,819.00 per minute.3 MOBILE ATTACKS BREACH COST 232 MILLION SOFTWARE STRONG STRONG SOFTWARE INTEL® HARDWARE $ SECUR TY MAKES STRONG SOFTWARE STRONGER! For decades, software's been the name of the game. It's your primary defense... but it’s your attacker's primary weapon. One-up the bad guys with hardware-assisted security. Extend and enhance the protective reach of security software with the built-in security technologies of hardware by Intel. HARDWARE Learn more at 1.Symantec Internet Threat Security Report, Volume 17. May 2012 2.Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013 3.Symantec, "Internet Security Threat Report: 2011 Trends," April 2012. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others. ENTERPRISE