SlideShare a Scribd company logo
1 of 1
Download to read offline
Findoutmoreatintel.com/enterprisesecurity
intelsecurity.com
SoftwareandworkloadsusedinperformancetestsmayhavebeenoptimizedforperformanceonlyonIntelmicroprocessors.Performancetests,suchasSYSmarkandMobileMark,aremeasuredusingspeciccomputersystems,components,software,operationsand
functions.Anychangetoanyofthosefactorsmaycausetheresultstovary.Youshouldconsultotherinformationandperformance!teststoassistyouinfullyevaluatingyourcontemplatedpurchases,includingtheperformanceofthatproductwhencombinedwith
otherpotherproducts.InteldoesnotcontrolorauditthedesignorimplementationofthirdpartybenchmarkdataorWebsitesreferencedinthisdocument.IntelencouragesallofitscustomerstovisitthereferencedWebsitesorotherswheresimilarperformancebenchmark
dataarereportedandconrmwhetherthereferencedbenchmarkdataareaccurateandreectperformanceofsystemsavailableforpurchase.Formoreinformationgotohttp://www.intel.com/performance.Intel,theIntellogo,andtheIntelSecuritylogoaretrade-
mamarksofIntelCorporationintheU.S.and/orothercountries.TheMcAfeelogoisatrademarkorregisteredtrademarkofMcAfee,Inc.intheUnitedStatesandothercountries.Copyright©2014IntelCorporation.Allrightsreserved.
Withhardware-enhancedsecurity,your
enterpriseishealthier,moreefficient,
andmoreresilienttothreats.
EnterpriseResiliency
...butwithagrowingoperationcomesgrowing
complexity.
Keepingtheenterprise
safeagainstattacksand
mishapsishardenough...
Makesecuritysoftwarestronger,andsystemsmoreresilient,
bybuildingsecurityintothehardware:rightintotheinfrastructure.
Intelisbuildingsecuritycapabilitiesrightintothe
chipset-theplatformsthemselves.
HERE’SINTEL’SPHILOSOPHY
INTELRESILIENCY
BADSTUFFHAPPENS
Theindividualcomputingdeviceisthenewperimeter.Allhackers
needisonevulnerableperson,andyourentireorganizationisatrisk,
observesGreenSQL’sDavidMaman.5
It’snolongeraquestionofIF,butWHEN
somethinggoeswrong.It’scriticalthatwhen
thingsgowrong,theyare xedquickly.
Evenduringmaintenanceandupdates,attackers
cansneakpastsoftwaredefenses.
71%ofemployeesdon’tobeypolicies.4
52%ofobservedmalwarebehaviors
focusedonevadingsecurityoranalysis,
comparedtoonly15%focusedon
hackinganddatatheft.3
54%oforganizationsresearchedhadatleast
onepotentialdatalossincident.2
Cleanupiscostly.Reimagingcantake vehourspermachine,derailingboththeITtechnicianandtheenduserfrommoreproductivework.
Asstealthtechniquesincreaseincomplexity,thesecleanupcostscanonlyincrease.Becausesomemalwarecanreincarnateafterareimage,
themostcautiousapproachinusetodayistoreplaceinfectedcomputers-ahighcapitalandproductivitycost.1
Securitysoftware,whileeffectiveinreducing
threats,cansometimesoverlookthetruesinister
intentions,andleaveasystemvulnerable.
FIND FIX
Ifyourrmwaregoesunguarded,badguyscan
infecttheentireenterprisethroughtheBIOS
infrastructurethatoftengetstakenforgranted.
1.McAfeeandIntel.“TheNewRealityofStealthCrimeware.”2011.http://www.mcafee.com/us/resources/white-papers/wp-reality-of-stealth-crimeware.pdf
2.CheckPoint.“2013InternetSecurityReport.”http://www.checkpoint.com/campaigns/security-report/
3.PaloAltoNetworks.“TheModernMalwareReview,AnalysisofNewandEvasiveMalwareinLiveEnterpriseNetworks.”1stEdition.March2013
4.Cisco.“CiscoSecurity:AppliedIntelligenceforaRiskyWorld.”2013.http://www.cisco.com/en/US/solutions/collateral/ns1015/ns1238/info_graphics_c82-727889.pdf
5.5.InfosecurityMagazine.“Comment:CybercrimeComestoaSiteNearYou.”November2013.http://www.infosecurity-magazine.com/view/35729/comment-cybercrime-comes-to-a-site-near-you/
Whentheverysystemyourenterprisereliesonisbreached,howcan
yoursecuritysoftwareeffectivelygetyoubackonyourfeet?
Youcanrestoreplatform rmwareandBIOS
toaknown-goodcongurationfromthe
manufacturer-withnothingmorethataUSBcable.
Whenyouneedtoupdatedevice
rmware,Intel®PlatformProtection
TechnologywithBIOSGuardhelpsto
keepshadythingsoutofthemix.
Intel®
Intel®Securitybolstersthe
protectionoftheoperatingsystem
andtheapplicationsitsupports.
FortifyyourFirmwareandpreciousbase-level
operatingresourcesfromattackswith
Intel®DeviceProtectionwithBootGuard.
Andifthereisanattackonwhatyoucan’tsee,
havingsecuritybuiltintothehardware
infrastructurecangiveyouvisibilityintotheattack
whilealsotriggeringyourdefenses.
FREEZE
Whensomethinggoesawry,youcaneffectively nd,freeze,and xtheproblemwith
reduceddowntime-gettingyoursystems,devices,andusersbackupandrunningquickly.

More Related Content

More from Intel IT Center

More from Intel IT Center (20)

Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMGIntel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
 
Gobblin for Data Analytics
Gobblin for Data AnalyticsGobblin for Data Analytics
Gobblin for Data Analytics
 
Empower Your Workforce to Work Anywhere.
Empower Your Workforce to Work Anywhere.Empower Your Workforce to Work Anywhere.
Empower Your Workforce to Work Anywhere.
 
Cloud-Ready Networks
Cloud-Ready NetworksCloud-Ready Networks
Cloud-Ready Networks
 

Recently uploaded

Recently uploaded (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

How Intel Security Gives the Enterprise Resiliency - Infographic