Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel Enterprise Security - Infographic
-
Upload
intel-it-center -
Category
Documents
-
view
122 -
download
5
description
Transcript of Intel Enterprise Security - Infographic
$5.5 MIL
Strong security software is made stronger when working directly with Intel® hardware.
SECURITY SOFTWARE
INTEL®HARDWARE
IDENTITY PROTECTION
Pertains to strengthening multi-levelauthentication and protecting passwords; a simple username and password solution is no longer enough.
Preventing viruses and malware such as rootkits and escalation-of-privilege attacks on the hardware before the OS is up and running.
Encryption for sensitive business data in thecloud as well as for online transactions, and mitigating the risk of lost or stolen intelligent devices.
Extends across all supported hardware with powerful remote support capabilities for proactive security management, monitoring, and remediation – regardless of the operational state.
ANTI-MALWARE
DATA PROTECTION
RESILIENCY
IDENTITY
Identities exposed in2011 globally. Thatequalled almost75% of the USpopulation at the time.1
Mobile vulnerabilitiesup 3,300% (10,900)in the last six months.2
Average cost tocompany of a breach.Within one day, that’s $3,819.00 per minute.3
MOBILE ATTACKS
BREACH COST
232MILLION
SOFTWARESTRONG STRONG
SOFTWARE
INTEL®
HARDWARE
$
SECUR TY
MAKES STRONG SOFTWARE STRONGER!
intel.com/enterprisesecurityintelsecurity.com
For decades, software's been the name of the game. It's your primary defense... but it’s your attacker's primary weapon.One-up the bad guys with hardware-assisted security. Extendand enhance the protective reach of security software withthe built-in security technologies of hardware by Intel.
HARDWARE
Learn more at
1.Symantec Internet Threat Security Report, Volume 17. May 2012
2.Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013
3.Symantec, "Internet Security Threat Report: 2011 Trends," April 2012. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark,
are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should
consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with
other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its
customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate
and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are
trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries.
Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others.
ENTERPRISE