Weitere ähnliche Inhalte Ähnlich wie Intel Enterprise Security - Infographic (20) Mehr von Intel IT Center (20) Intel Enterprise Security - Infographic1. $5.5 MIL
Strong security software is
made stronger when working
directly with Intel® hardware.
SECURITY
SOFTWARE
INTEL®
HARDWARE
IDENTITY PROTECTION
Pertains to strengthening multi-level
authentication and
protecting passwords;
a simple username and
password solution
is no longer enough.
Preventing viruses and
malware such as rootkits
and escalation-of-privilege
attacks on the hardware
before the OS is up and running.
Encryption for sensitive
business data in the
cloud as well as for online
transactions, and mitigating
the risk of lost or stolen intelligent devices.
Extends across all supported hardware with
powerful remote support capabilities for
proactive security management,
monitoring, and remediation –
regardless of the operational state.
ANTI-MALWARE
DATA PROTECTION
RESILIENCY
IDENTITY
Identities exposed in
2011 globally. That
equalled almost
75% of the US
population at the time.1
Mobile vulnerabilities
up 3,300% (10,900)
in the last six months.2
Average cost to
company of a breach.
Within one day, that’s
$3,819.00 per minute.3
MOBILE ATTACKS
BREACH COST
232
MILLION
SOFTWARE
STRONG STRONG
SOFTWARE
INTEL®
HARDWARE
$
SECUR TY
MAKES STRONG SOFTWARE STRONGER!
intel.com/enterprisesecurity
intelsecurity.com
For decades, software's been the name of the game. It's your
primary defense... but it’s your attacker's primary weapon.
One-up the bad guys with hardware-assisted security. Extend
and enhance the protective reach of security software with
the built-in security technologies of hardware by Intel.
HARDWARE
Learn more at
1.Symantec Internet Threat Security Report, Volume 17. May 2012
2.Gus Hunt, CIA CTO. "The Cyber-Future; Utopia, Dystopia, Myopia." PowerPoint presentation. Intel Future of Fear Conference. 12 March 2013
3.Symantec, "Internet Security Threat Report: 2011 Trends," April 2012. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark,
are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should
consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with
other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its
customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate
and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are
trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries.
Copyright © 2014 Intel Corporation. All rights reserved. * Other names and brands may be claimed as the property of others.
ENTERPRISE