More Related Content More from Intel IT Center (20) How Intel Security Gives the Enterprise Resiliency - Infographic1. Findoutmoreatintel.com/enterprisesecurity
intelsecurity.com
SoftwareandworkloadsusedinperformancetestsmayhavebeenoptimizedforperformanceonlyonIntelmicroprocessors.Performancetests,suchasSYSmarkandMobileMark,aremeasuredusingspeciccomputersystems,components,software,operationsand
functions.Anychangetoanyofthosefactorsmaycausetheresultstovary.Youshouldconsultotherinformationandperformance!teststoassistyouinfullyevaluatingyourcontemplatedpurchases,includingtheperformanceofthatproductwhencombinedwith
otherpotherproducts.InteldoesnotcontrolorauditthedesignorimplementationofthirdpartybenchmarkdataorWebsitesreferencedinthisdocument.IntelencouragesallofitscustomerstovisitthereferencedWebsitesorotherswheresimilarperformancebenchmark
dataarereportedandconrmwhetherthereferencedbenchmarkdataareaccurateandreectperformanceofsystemsavailableforpurchase.Formoreinformationgotohttp://www.intel.com/performance.Intel,theIntellogo,andtheIntelSecuritylogoaretrade-
mamarksofIntelCorporationintheU.S.and/orothercountries.TheMcAfeelogoisatrademarkorregisteredtrademarkofMcAfee,Inc.intheUnitedStatesandothercountries.Copyright©2014IntelCorporation.Allrightsreserved.
Withhardware-enhancedsecurity,your
enterpriseishealthier,moreefficient,
andmoreresilienttothreats.
EnterpriseResiliency
...butwithagrowingoperationcomesgrowing
complexity.
Keepingtheenterprise
safeagainstattacksand
mishapsishardenough...
Makesecuritysoftwarestronger,andsystemsmoreresilient,
bybuildingsecurityintothehardware:rightintotheinfrastructure.
Intelisbuildingsecuritycapabilitiesrightintothe
chipset-theplatformsthemselves.
HERE’SINTEL’SPHILOSOPHY
INTELRESILIENCY
BADSTUFFHAPPENS
Theindividualcomputingdeviceisthenewperimeter.Allhackers
needisonevulnerableperson,andyourentireorganizationisatrisk,
observesGreenSQL’sDavidMaman.5
It’snolongeraquestionofIF,butWHEN
somethinggoeswrong.It’scriticalthatwhen
thingsgowrong,theyare xedquickly.
Evenduringmaintenanceandupdates,attackers
cansneakpastsoftwaredefenses.
71%ofemployeesdon’tobeypolicies.4
52%ofobservedmalwarebehaviors
focusedonevadingsecurityoranalysis,
comparedtoonly15%focusedon
hackinganddatatheft.3
54%oforganizationsresearchedhadatleast
onepotentialdatalossincident.2
Cleanupiscostly.Reimagingcantake vehourspermachine,derailingboththeITtechnicianandtheenduserfrommoreproductivework.
Asstealthtechniquesincreaseincomplexity,thesecleanupcostscanonlyincrease.Becausesomemalwarecanreincarnateafterareimage,
themostcautiousapproachinusetodayistoreplaceinfectedcomputers-ahighcapitalandproductivitycost.1
Securitysoftware,whileeffectiveinreducing
threats,cansometimesoverlookthetruesinister
intentions,andleaveasystemvulnerable.
FIND FIX
Ifyourrmwaregoesunguarded,badguyscan
infecttheentireenterprisethroughtheBIOS
infrastructurethatoftengetstakenforgranted.
1.McAfeeandIntel.“TheNewRealityofStealthCrimeware.”2011.http://www.mcafee.com/us/resources/white-papers/wp-reality-of-stealth-crimeware.pdf
2.CheckPoint.“2013InternetSecurityReport.”http://www.checkpoint.com/campaigns/security-report/
3.PaloAltoNetworks.“TheModernMalwareReview,AnalysisofNewandEvasiveMalwareinLiveEnterpriseNetworks.”1stEdition.March2013
4.Cisco.“CiscoSecurity:AppliedIntelligenceforaRiskyWorld.”2013.http://www.cisco.com/en/US/solutions/collateral/ns1015/ns1238/info_graphics_c82-727889.pdf
5.5.InfosecurityMagazine.“Comment:CybercrimeComestoaSiteNearYou.”November2013.http://www.infosecurity-magazine.com/view/35729/comment-cybercrime-comes-to-a-site-near-you/
Whentheverysystemyourenterprisereliesonisbreached,howcan
yoursecuritysoftwareeffectivelygetyoubackonyourfeet?
Youcanrestoreplatform rmwareandBIOS
toaknown-goodcongurationfromthe
manufacturer-withnothingmorethataUSBcable.
Whenyouneedtoupdatedevice
rmware,Intel®PlatformProtection
TechnologywithBIOSGuardhelpsto
keepshadythingsoutofthemix.
Intel®
Intel®Securitybolstersthe
protectionoftheoperatingsystem
andtheapplicationsitsupports.
FortifyyourFirmwareandpreciousbase-level
operatingresourcesfromattackswith
Intel®DeviceProtectionwithBootGuard.
Andifthereisanattackonwhatyoucan’tsee,
havingsecuritybuiltintothehardware
infrastructurecangiveyouvisibilityintotheattack
whilealsotriggeringyourdefenses.
FREEZE
Whensomethinggoesawry,youcaneffectively nd,freeze,and xtheproblemwith
reduceddowntime-gettingyoursystems,devices,andusersbackupandrunningquickly.