how intel security ensures identity protection - infographic

1
EASE OF USE Strong security software is made stronger when working directly with Intel® hardware. SECURITY SOFTWARE INTEL® HARDWARE STRONG AUTHENTICATION IT GUY PROTECT ON Intel® IPT with Public Key Infrastructure stores your users’ keys right in the hardware, ensuring your sensitive sessions are trustworthy! One up the bad guys with hardware-assisted security. IDENTITY MULTIFACTOR AUTHENTICATION MULTIFACTOR AUTHENTICATION DIFFICULT TO DEPLOY & MANAGE MAKES IDENTITY PROTECTION MULTIFACTOR AUTHENTICATION DIFFICULT TO DEPLOY & MANAGE MAKES IDENTITY PROTECTION CAN BE EASIER WITH INTEL® IDENTITY PROTECTION TECHNOLOGY SIMPLE ISN’T ENOUGH Username and password combos just aren’t cutting it. Adding layers of security and stronger authentication is great for protection, but gets complicated fast. 64% of end users report they have written down a password at least once. 1 2012 saw a 42% increase in targeted attacks. 2 11 million identities stolen in 1 year. 3 Hackers are responsible for the largest number of data breaches, making up 40% of all breaches. 4 64% of end users report they have written down a password at least once. 1 2012 saw a 42% increase in targeted attacks. 2 11 million identities stolen in 1 year. 3 Hackers are responsible for the largest number of data breaches, making up 40% of all breaches. 4 ONE-TIME PASSWORD PROTECTED TRANSACTION DISPLAY Intel® Identity Protection Technology with One-Time Password integrates a token-generator into the hardware so it’s SIMPLER for! users and easier for you to provision and manage those tokens remotely! PUBLIC KEY INFRASTRUCTURE NEAR-FIELD COMMUNICATTION Intel® IPT with Near Field Communication gives you additional security, instantly. Intel® Identity Protection Technology also gives you the power to revoke that authentication remotely, for total control. Intel® IPT with Protected Transaction Display lets users authenticate themselves with a PIN pad that’s tied directly to the hardware and isolated from the OS, so prying eyes can’t see. DEPLOYMENT HEADACHES Constantly updating operating systems and firmware requires too much of your time keeping security measures up. LOGISTICAL NIGHTMARE Provisioning your users with a laptop, key fob, ID card, key generator, and retinal eye scanner AND keeping your network secure is a logistical nightmare. SECURITY EVERYWHERE With more work happening outside the office walls, it’s hard to maintain the same level of security. intel.com/enterprisesecurity intelsecurity.com 1. Rainbow Technologies Password Survey 2. 2013 Symantec Internet Security Threat Report, Volume 18, April 2013 3. 2012 Javelin Strategy & Research on Identity Theft 4. 2013 Symantec Internet Security Threat Report, Volume 18, April 2013 LEARN MORE SAFER DEVICES THAT MAKE SECURITY SOFTWARE EVEN STRONGER Intel ® Identity Protection Technology enables the strong authentication you need with the ease-of-use your users crave. Better security through strong hardware, that’s Intel’s philosophy. What can your Intel ® processor-powered device do for YOU? Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. *Other names and brands may be claimed as the property of others.

Upload: intel-it-center

Post on 27-Jan-2015

106 views

Category:

Technology


1 download

DESCRIPTION

Is there a way to make multifactor authentication EASY to deploy? See this simple infographic to find out how Intel can help.

TRANSCRIPT

Page 1: How Intel Security Ensures Identity Protection - Infographic

EASEOF USE

Strong security software is made stronger when working directly with Intel® hardware.

SECURITY SOFTWARE

INTEL®HARDWARE

STRONGAUTHENTICATION

IT GUY

PROTECT ON

Intel® IPT with Public Key Infrastructure stores your users’ keys right in the hardware, ensuring your sensitive sessions are trustworthy!

MAKES STRONG SOFTWARE STRONGER!For decades, software's been the name of the game. It's your primary defense. It's your attacker's primary weapon.One up the bad guys with hardware-assisted security.

HARDWARE

IDENTITY

MULTIFACTOR AUTHENTICATION

MULTIFACTOR AUTHENTICATION

DIFFICULT TO DEPLOY & MANAGEMAKES IDENTITY PROTECTION

MULTIFACTOR AUTHENTICATION

DIFFICULT TO DEPLOY & MANAGEMAKES IDENTITY PROTECTION

CAN BE EASIER WITH INTEL® IDENTITY PROTECTION TECHNOLOGY

SIMPLEISN’T

ENOUGH

Username and password combos just aren’t cutting it. Adding layers of security and stronger authentication is great for protection, but gets complicated fast.

64% of end users report they have written down a password at least once.1 2012 saw a 42% increase in targeted attacks.2

11 million identities stolen in 1 year.3Hackers are responsible for the largest number of data breaches, making up 40% of all breaches.4

64% of end users report they have written down a password at least once.1 2012 saw a 42% increase in targeted attacks.2

11 million identities stolen in 1 year.3Hackers are responsible for the largest number of data breaches, making up 40% of all breaches.4

ONE-TIME PASSWORD PROTECTED TRANSACTION DISPLAY

Intel® Identity Protection Technology with One-Time Password integrates a token-generator into the hardware so it’s SIMPLER for! users and easier for you to provision and manage those tokens remotely!

PUBLIC KEY INFRASTRUCTURE NEAR-FIELD COMMUNICATTION

Intel® IPT with Near Field Communication gives you additional security, instantly. Intel® Identity Protection Technology also gives you the power to revoke that authentication remotely, for total control.

Intel® IPT with Protected Transaction Display lets users authenticate themselves with a PIN pad that’s tied directly to the hardware and isolated from the OS, so prying eyes can’t see.

DEPLOYMENTHEADACHES

Constantly updating operating systems and firmware requires too much of your time keeping security measures up.

LOGISTICALNIGHTMARE

Provisioning your users with a laptop, key fob, ID card, key generator, and retinal eye scanner AND keeping your network secure is a logistical nightmare.

SECURITYEVERYWHERE

With more work happening outside the office walls, it’s hard to maintain the same level of security.

intel.com/enterprisesecurityintelsecurity.com

1. Rainbow Technologies Password Survey 2. 2013 Symantec Internet Security Threat Report, Volume 18, April 2013 3. 2012 Javelin Strategy & Research on Identity Theft 4. 2013 Symantec Internet Security Threat Report, Volume 18, April 2013

LEARN MORE

SAFER DEVICES THAT MAKE SECURITY SOFTWARE EVEN STRONGER

Intel® Identity Protection Technology enables the strong authentication you need with the ease-of-use your users crave. Better security through strong hardware, that’s Intel’s philosophy. What can your Intel® processor-powered device do for YOU?

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any

of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or

implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and

reflect performance of systems available for purchase. For more information go to http://www.intel.com/performance. Intel, the Intel logo, and the Intel Security logo are trademarks of Intel Corporation in the U.S. and/or other countries. The McAfee logo is a trademark or registered trademark of

McAfee, Inc. in the United States and other countries. Copyright © 2014 Intel Corporation. All rights reserved. *Other names and brands may be claimed as the property of others.