15
PROTECTION IDENTITY I.D. CLEARANCE LEVEL: ??? ? CLEARANCE LEVEL: BLUE Stronger, safer, more powerful with Intel.

How Intel Security Ensures Identity Protection

Embed Size (px)

DESCRIPTION

If you want to protect your enterprise, you have to protect your employee’s identities. But adding layers of authentication frustrates users and slows down your company. Here's Intel's philosophy: make security software stronger, with strong hardware. Intel provides a host of verification and authentication capabilities that are built right into the hardware. See how these additions guard users’ identities without bogging down their productivity. Learn more at http://intel.com/enterprisesecurity.

Citation preview

Page 1: How Intel Security Ensures Identity Protection

PROTECTIONIDENTITY I.D.

CLEARANCE LEVEL: ???

?CLEARANCE LEVEL: BLUE

Stronger, safer, more powerful with Intel.

Page 2: How Intel Security Ensures Identity Protection

Traditional identity protection is hard.

?? What city wereyou born in?

Page 3: How Intel Security Ensures Identity Protection

Simple isn’t enough.

ENTER PASSWORD

USERNAME

PASSWORD

LOGIN

s_mcawesome

**************

EDIT PASSWORDUSERNAME

PASSWORD

RE-ENTER PASSWORD

SAVE PASSWORD

s_mcawesome

**************

**************

2ND AUTHENTICATION

TYPE PHRASE BELOW

LOGIN

s F 2 h K 7 x

Username and password combos just aren’t cutting it.

Adding layers of security and stronger authentication is

great for protection, but gets complicated fast.

Page 4: How Intel Security Ensures Identity Protection

Deployment headache.

***

Constantly updating operating systems and

firmware requires too much of your time

just to keep security measures up.

Page 5: How Intel Security Ensures Identity Protection

Logistical nightmare.

!

Provisioning your users with a laptop, key fob,

ID card, key generator, and retinal eye scanner AND

keeping your network secure is a logistical nightmare.

Page 6: How Intel Security Ensures Identity Protection

64% of end users

report they have written down

a password at least once.

*Rainbow Technologies Password Survey

*2012 Javelin Strategy & Research on Identity Theft

11 million identities

stolen in 1 year

I.D.

CLEARANCE LEVEL: ???

?CLEARANCE LEVEL:

*2013 Symantec Internet Security Threat Report

2012 saw a

42% increase in

targeted attacks.

*2013 Symantec Internet Security Threat Report

Hackers are responsible for the

largest number of data breaches,

making up 40% of all breaches

Page 7: How Intel Security Ensures Identity Protection

Security everywhere.

With an increase in consumerization, more and more

work is happening outside the office walls. It’s hard to

maintain a high level of security everywhere.

Page 8: How Intel Security Ensures Identity Protection

Intel makes Multifactor Authentication easierwith

INTEL® IDENTITY PROTECTION TECHNOLOGY

X @ 7 b# F * 3O 8 & !% e + z

Page 9: How Intel Security Ensures Identity Protection

Here is Intel’s philosophy:Make security software stronger ... with hardware.

SECURITY SOFTWARE

INTEL®HARDWARE

Page 10: How Intel Security Ensures Identity Protection

Everytime a device boots...It does so securely.One-time password.

ONE-TIME PASSWORD

GENERATEn 3 # 7 f %

Intel® Identity Protection Technology with One-Time

Password integrates a token-generator into the hardware so

it’s SIMPLER for users and easier for you to provision and

manage those tokens remotely!

Page 11: How Intel Security Ensures Identity Protection

If something goes wrong, it’s fixed in a secure environment.

Everytime a device boots...It does so securely.

Protected transaction display.

Intel® IPT with Protected Transaction Display lets users

authenticate themselves with a PIN pad that’s tied directly to the

hardware and isolated from the OS, so prying eyes can’t see.

Page 12: How Intel Security Ensures Identity Protection

If something goes wrong, it’s fixed in a secure environment.

Everytime a device boots...It does so securely.

Public key infrastructure.

Intel® IPT with Public Key infrastructure stores your

users’ keys right in the hardware, ensuring your

sensitive sessions are trustworthy!

Page 13: How Intel Security Ensures Identity Protection

If something goes wrong, it’s fixed in a secure environment.

Everytime a device boots...It does so securely.

Near-field communications.

I.D.CLEARANCE LEVEL: ???

?CLEARANCE LEVEL: BLUE

IDENTITY VERIFIED!

Intel® IPT with Near Field Communication gives you

additional security, instantly. Intel® Identity Protection

Technology also gives you the power to revoke that

authentication remotely, for total control.

Page 14: How Intel Security Ensures Identity Protection

Intel® technology makes security software even stronger and devices even safer.

ONE-TIME PASSWORD ENCRYPTIONPROTECTEDTRANSACTION DISPLAY

NEAR-FIELD COMMUNICATIONS

X @ 7 b# F * 3O 8 & !% e + z

Page 15: How Intel Security Ensures Identity Protection

intel.com/enterprisesecurity

intelsecurity.com

Learn more at

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluat-ing your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites

referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel

Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. *Other names and brands may be claimed as the property of others.