1
$5.5 MIL Strong security software is made stronger when working directly with Intel® hardware. SECURITY SOFTWARE INTEL® HARDWARE IDENTITY PROTECTION Pertains to strengthening multi-level authentication and protecting passwords; a simple username and password solution is no longer enough. Preventing viruses and malware such as rootkits and escalation-of-privilege attacks on the hardware before the OS is up and running. Encryption for sensitive business data in the cloud as well as for online transactions, and mitigating the risk of lost or stolen intelligent devices. Extends across all supported hardware with powerful remote support capabilities for proactive security management, monitoring, and remediation – regardless of the operational state. ANTI-MALWARE DATA PROTECTION RESILIENCY IDENTITY Identities exposed in 2011 globally. That equalled almost 75% of the US population at the time. 1 Mobile vulnerabilities up 3,300% (10,900) in the last six months. 2 Average cost to company of a breach. Within one day, that’s $3,819.00 per minute. 3 MOBILE ATTACKS BREACH COST 232 MILLION SOFTWARE STRONG STRONG SOFTWARE INTEL ® HARDWARE $ SECUR TY MAKES STRONG SOFTWARE STRONGER! intel.com/enterprisesecurity intelsecurity.com For decades, software's been the name of the game. It's your primary defense... but it’s your attacker's primary weapon. One-up the bad guys with hardware-assisted security. Extend and enhance the protective reach of security software with the built-in security technologies of hardware by Intel. HARDWARE Learn more at 1.Symantec Internet Threat Security Report, Volume 17. May 2012 2.Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013 3.Symantec, "Internet Security Threat Report: 2011 Trends," April 2012. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others. ENTERPRISE

Intel Enterprise Security - Infographic

Embed Size (px)

DESCRIPTION

It takes vigilance to defend your enterprise. You have to keep air-tight security, but you also have to keep employees mobile, productive, and happy. You have to keep up with the competition, but you also have to stay within the boundaries of compliance and policy. Here's Intel's philosophy: make security software stronger, with strong hardware. See how from boot time to run time, Intel’s hardware fortifies the security of the enterprise. Learn more at http://intel.com/enterprisesecurity.

Citation preview

Page 1: Intel Enterprise Security - Infographic

$5.5 MIL

Strong security software is made stronger when working directly with Intel® hardware.

SECURITY SOFTWARE

INTEL®HARDWARE

IDENTITY PROTECTION

Pertains to strengthening multi-levelauthentication and protecting passwords; a simple username and password solution is no longer enough.

Preventing viruses and malware such as rootkits and escalation-of-privilege attacks on the hardware before the OS is up and running.

Encryption for sensitive business data in thecloud as well as for online transactions, and mitigating the risk of lost or stolen intelligent devices.

Extends across all supported hardware with powerful remote support capabilities for proactive security management, monitoring, and remediation – regardless of the operational state.

ANTI-MALWARE

DATA PROTECTION

RESILIENCY

IDENTITY

Identities exposed in2011 globally. Thatequalled almost75% of the USpopulation at the time.1

Mobile vulnerabilitiesup 3,300% (10,900)in the last six months.2

Average cost tocompany of a breach.Within one day, that’s $3,819.00 per minute.3

MOBILE ATTACKS

BREACH COST

232MILLION

SOFTWARESTRONG STRONG

SOFTWARE

INTEL®

HARDWARE

$

SECUR TY

MAKES STRONG SOFTWARE STRONGER!

intel.com/enterprisesecurityintelsecurity.com

For decades, software's been the name of the game. It's your primary defense... but it’s your attacker's primary weapon.One-up the bad guys with hardware-assisted security. Extendand enhance the protective reach of security software withthe built-in security technologies of hardware by Intel.

HARDWARE

Learn more at

1.Symantec Internet Threat Security Report, Volume 17. May 2012

2.Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013

3.Symantec, "Internet Security Threat Report: 2011 Trends," April 2012. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark,

are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should

consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with

other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its

customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate

and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are

trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries.

Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others.

ENTERPRISE