How Intel Security Gives the Enterprise Resiliency - Infographic

1

description

Resiliency means being able to bend and not break, to fix problems as they arise. Unfortunately, security software can only go so far in fending off attacks on firmware and the operating system. This infographic lays out Intel’s plan for building defenses right into the hardware—right into the infrastructure of your system.

Transcript of How Intel Security Gives the Enterprise Resiliency - Infographic

Page 1: How Intel Security Gives the Enterprise Resiliency - Infographic

Find out more at intel.com/enterprisesecurityintelsecurity.com

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specic computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance! tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other pother products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and conrm whether the referenced benchmark data are accurate and reect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trade-

mamarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved.

With hardware-enhanced security, yourenterprise is healthier, more efficient,and more resilient to threats.

Enterprise Resiliency

...but with a growing operation comes growing complexity.

Keeping the enterprise safe against attacks and mishaps is hard enough...

Make security software stronger, and systems more resilient,by building security into the hardware: right into the infrastructure.

Intel is building security capabilities right into thechipset - the platforms themselves.

HERE’S INTEL’S PHILOSOPHY

INTEL RESILIENCY

BAD STUFF HAPPENSThe individual computing device is the new perimeter. All hackersneed is one vulnerable person, and your entire organization is at risk,observes GreenSQL’s David Maman.5

It’s no longer a question of IF, but WHENsomething goes wrong. It’s critical that whenthings go wrong, they are xed quickly.

Even during maintenance and updates, attackerscan sneak past software defenses.

71% of employees don’t obey policies.4

52% of observed malware behaviorsfocused on evading security or analysis, compared to only 15% focused onhacking and data theft.3

54% of organizations researched had at leastone potential data loss incident.2

Cleanup is costly. Reimaging can take ve hours per machine, derailing both the IT technician and the end user from more productive work.As stealth techniques increase in complexity, these cleanup costs can only increase. Because some malware can reincarnate after a reimage,the most cautious approach in use today is to replace infected computers - a high capital and productivity cost.1

Security software, while effective in reducingthreats, can sometimes overlook the true sinisterintentions, and leave a system vulnerable.

FIND FIX

If your rmware goes unguarded, bad guys caninfect the entire enterprise through the BIOSinfrastructure that often gets taken for granted.

1. McAfee and Intel. “The New Reality of Stealth Crimeware.” 2011. http://www.mcafee.com/us/resources/white-papers/wp-reality-of-stealth-crimeware.pdf2. Check Point. “2013 Internet Security Report.” http://www.checkpoint.com/campaigns/security-report/3. Palo Alto Networks. “The Modern Malware Review, Analysis of New and Evasive Malware in Live Enterprise Networks.” 1st Edition. March 20134. Cisco. “Cisco Security: Applied Intelligence for a Risky World.” 2013. http://www.cisco.com/en/US/solutions/collateral/ns1015/ns1238/info_graphics_c82-727889.pdf5. 5. Infosecurity Magazine. “Comment: Cybercrime Comes to a Site Near You.” November 2013. http://www.infosecurity-magazine.com/view/35729/comment-cybercrime-comes-to-a-site-near-you/

When the very system your enterprise relies on is breached, how canyour security software effectively get you back on your feet?

You can restore platform rmware and BIOSto a known-good conguration from the

manufacturer - with nothing more that a USB cable.

When you need to update devicermware, Intel® Platform Protection Technology with BIOS Guard helps tokeep shady things out of the mix.

Intel®

Intel® Security bolsters the protection of the operating systemand the applications it supports.

Fortify your Firmware and precious base-leveloperating resources from attacks withIntel® Device Protection with Boot Guard.

And if there is an attack on what you can’t see,having security built into the hardware

infrastructure can give you visibility into the attack while also triggering your defenses.

FREEZE

When something goes awry, you can effectively nd, freeze, and x the problem withreduced downtime - getting your systems, devices, and users back up and running quickly.