PROTECTIONIDENTITY I.D.
CLEARANCE LEVEL: ???
?CLEARANCE LEVEL: BLUE
Stronger, safer, more powerful with Intel.
Traditional identity protection is hard.
?? What city wereyou born in?
Simple isn’t enough.
ENTER PASSWORD
USERNAME
PASSWORD
LOGIN
s_mcawesome
**************
EDIT PASSWORDUSERNAME
PASSWORD
RE-ENTER PASSWORD
SAVE PASSWORD
s_mcawesome
**************
**************
2ND AUTHENTICATION
TYPE PHRASE BELOW
LOGIN
s F 2 h K 7 x
Username and password combos just aren’t cutting it.
Adding layers of security and stronger authentication is
great for protection, but gets complicated fast.
Deployment headache.
***
Constantly updating operating systems and
firmware requires too much of your time
just to keep security measures up.
Logistical nightmare.
!
Provisioning your users with a laptop, key fob,
ID card, key generator, and retinal eye scanner AND
keeping your network secure is a logistical nightmare.
64% of end users
report they have written down
a password at least once.
*Rainbow Technologies Password Survey
*2012 Javelin Strategy & Research on Identity Theft
11 million identities
stolen in 1 year
I.D.
CLEARANCE LEVEL: ???
?CLEARANCE LEVEL:
*2013 Symantec Internet Security Threat Report
2012 saw a
42% increase in
targeted attacks.
*2013 Symantec Internet Security Threat Report
Hackers are responsible for the
largest number of data breaches,
making up 40% of all breaches
Security everywhere.
With an increase in consumerization, more and more
work is happening outside the office walls. It’s hard to
maintain a high level of security everywhere.
Intel makes Multifactor Authentication easierwith
INTEL® IDENTITY PROTECTION TECHNOLOGY
X @ 7 b# F * 3O 8 & !% e + z
Here is Intel’s philosophy:Make security software stronger ... with hardware.
SECURITY SOFTWARE
INTEL®HARDWARE
Everytime a device boots...It does so securely.One-time password.
ONE-TIME PASSWORD
GENERATEn 3 # 7 f %
Intel® Identity Protection Technology with One-Time
Password integrates a token-generator into the hardware so
it’s SIMPLER for users and easier for you to provision and
manage those tokens remotely!
If something goes wrong, it’s fixed in a secure environment.
Everytime a device boots...It does so securely.
Protected transaction display.
Intel® IPT with Protected Transaction Display lets users
authenticate themselves with a PIN pad that’s tied directly to the
hardware and isolated from the OS, so prying eyes can’t see.
If something goes wrong, it’s fixed in a secure environment.
Everytime a device boots...It does so securely.
Public key infrastructure.
Intel® IPT with Public Key infrastructure stores your
users’ keys right in the hardware, ensuring your
sensitive sessions are trustworthy!
If something goes wrong, it’s fixed in a secure environment.
Everytime a device boots...It does so securely.
Near-field communications.
I.D.CLEARANCE LEVEL: ???
?CLEARANCE LEVEL: BLUE
IDENTITY VERIFIED!
Intel® IPT with Near Field Communication gives you
additional security, instantly. Intel® Identity Protection
Technology also gives you the power to revoke that
authentication remotely, for total control.
Intel® technology makes security software even stronger and devices even safer.
ONE-TIME PASSWORD ENCRYPTIONPROTECTEDTRANSACTION DISPLAY
NEAR-FIELD COMMUNICATIONS
X @ 7 b# F * 3O 8 & !% e + z
intel.com/enterprisesecurity
intelsecurity.com
Learn more at
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluat-ing your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites
referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel
Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. *Other names and brands may be claimed as the property of others.
Top Related