protect your business with proven security solutions...secure, automatic, and e˝cient data backup...

16
+ + + + + + + + + + + + + **** _ Protect Your Business with Proven Security Solutions LENOVO 360° SECURITY Buyer’s Guide

Upload: others

Post on 08-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

+

+

+

+

+

+

+

+

++

+

+

+****_

Protect Your Business with Proven Security Solutions

LENOVO 360°SECURITY

Buyer’s Guide

Page 2: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

+

+

+

+

+

+

+

+

+

+

+

+

****_

Click hereto explore Lenovo's Security Solutions

2 3

As mobility grows, protection of data andnetworks is becoming a huge concern fornearly every business. The level of sophisticationof today's security threats prompt the need fora comprehensive approach to keep your businessdevices, networks, and data protected.The introduction of the stringent General DataProtection Regulation (GDPR) in the EuropeanUnion by May 2018 also means stern punitiveaction for negligence that could jeopardizeconfidential data, or for any othernon compliance.

Security and DataProtection for theDigital World

Page 3: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Common MistakesOrganizations MakeWhile DeterminingSecurity PolicySome organizations focus on a couple of key piecesof security. For example, some focus exclusivelyon anti-virus technologies.

The problem is that today less than 40% of attacksinvolve malware. You need a 360° approach to security,or you will be exposed.

Here are some aspects that organizations are doingcompletely wrong:

If you think you're secure when you protect your network perimeter, you're goingto fall short. Today, adversaries are finding ways to penetrate the network andexecute codes at the system's endpoints. If you're only looking at the perimeter,an adversary – once inside – can operate freely without threat of detection.

Don't approach security as just another IT issue. Everyone at the company ownsthe data and has a responsibility to protect the company's core assets.

Focusing on network instead of businessapplications as the highest level of vulnerabilityis on the application layer

Failing to recognize the humanaspect of security

Not recognizing security as one of thetop priorities while adopting new solutions

Assuming that some type of dataisn't valuable

4 5

Click here to explore Lenovo's Security Solutions

Page 4: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Lenovo – Your FirstChoice for SecurityLenovo has a rich legacy of over three decades of delivering powerful, cutting edgeIT products, solutions, and services to consumers, small and medium businesses,and enterprise clients across the world. Backed by deep expertise and supportedby a global network of trained and certified technical service professionals, Lenovo'sphilosophy to security is all encompassing.

Lenovo's 360° security strategy is the preferred way to protect your network,your devices, and your data from cyber threats. When you think security,think Lenovo.

Click here to explore Lenovo's Security Solutions

6 7

Best-in-Class Hardware Security

Securely DevelopedSoftware

CompleteComponentVerification

Adoption andExtension ofSecurityTechnology

SecureSupply Chain

Page 5: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Three Pillarsof Lenovo's 360°Security ApproachLenovo's comprehensive security strategy includes technologysolutions built into all devices to protect businesses, networksand users. These security solutions help address security needsfrom three distinct perspectives:

User AccessControl

Port and PhysicalProtection

Data Protection

Click hereto explore Lenovo's Security Solutions

8 9

****

Page 6: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

+

+

+

+

+

+

+

+

+

++

+

+

****_

User AccessControlWith an increasing number of employees working on the go,the need for IT teams to ramp up security for devices is alsogrowing. IT teams need to monitor and protect theirorganizations and users against threats such as unauthorizedaccess, ID theft and hacking.

****

Click here to explore Lenovo's Security Solutions

10 11

Page 7: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

+

+

+

+

+

+

+

+

+

+

+

+

+

+

**** _

Smart Card Access

A highly secure way of storing login information in tamper-proof cards that can alsobe used to manage access to multiple devices without using passwords. Smart cardsdirectly implement a two-factor authentication policy, ensuring that devices are averseto threats.

Near Field Communication (NFC)

NFC is a type of radio communication standard, much like Bluetooth, WiFi and othernetworking technologies. To snag the NFC signal to log in, the user needs to be physicallyclose to the company's PC, with the right NFC tag or secondary device. Without the tag,it is impossible to hack into a device.

User Access Control

****

Multi Factor Authentication

Lenovo's biometric fingerprint recognitionensures simplified access management androbust security. As a leader in multi factorauthentication (MFA), Lenovo also o�ers thefollowing features in its devices:

Match on Chip Fingerprint Reader (MoC FPR)

This is the most secure fingerprint technology on a PC becausethe biometric credentials are stored on a separate chip, makingit almost impossible to hack into.

MFA is further strengthened with Intel® Authenticate which givesIT the flexibility to create and deploy customized hardened MFApolicies to enforce user identity protection for access to the corporatedomain, network, and VPN, and securing data. Intel® Authenticatesolution provides a simple self-service enrollment tool for end usersto quickly get started, eliminating calls to IT.

Click here to explore Lenovo's Security Solutions

12 13

Page 8: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Smart USB Protection

Blocks the data transfer capability of the USB portbut keeps the port functional for input devices likemouse and keyboard.

Camera Shutter

Camera hacking risks can be avoided by physicallycovering the camera. With the shutter built into thecamera, protecting privacy just requires closing thecamera shutter - no more worries about anyoneeyeing the user.

Chassis Lock

A lock and key mechanism that preventstheft of components like hard drivesand graphics cards.

Port and PhysicalProtectionWhether in the o�ce or on the go, end user computingdevices need protection not only at the software levelbut also at a physical level. Built-in port security features help protect against physical theftof data via the USB and other access portson company PCs.

to explore Lenovo's Security SolutionsClick here

14 15

Page 9: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

FDE encrypts all data on harddrives, without the use of thirdparty encryption solutions.

No initial setup or 'enableencryption' is required; in fact,it is not possible to disableencryption on an FDEhard drive.

Data ProtectionImplementing strong data encryption toolsand technology enables easy and e�cientdata recovery and retrieval only by authorizedpersonnel, in the case of data loss or theft.Secure, automatic, and e�cient data backupgoes a long way in keeping your businessprocesses running smoothly and without disruption. Full Drive Encryption (FDE)

Hard drive encryption prevents unauthorized access to data and sophisticated attacks.The dTPM 2.0 chip encrypts user data on the PC.

Click here to explore Lenovo's Security Solutions

To completely protect data, a hard drivepassword prevents unauthorized bootingand data access; full disk encryptionprevents more sophisticated attacks.

The hard drive passwords haveno e�ect on the encryption key.The passwords can safely be changedwithout risking loss of data.

16 17

Page 10: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Online Data Backup (OLDB)

Compared to tape archives, backing up your business data online automaticallyo�ers better speed and ease of use.

1Based on internal Lenovo records

Allows backups to be set to run automatically, enabling greater employee compliance.

OLDB is a simple, automatic and secure cloud backup solution for desktops, laptops and servers.

It ensures your business criticalinformation is safe and secure.

Requires no capital expenditures for hardware - low upfront investment withminimal maintenance overhead.

Total Cost of Ownership savings is 1more than 30% relative to in-house

backup solutions.

Relative to tape-based approaches, OLDB is more e�cient, less intensive for the operator, and less prone to human error.

Data Protection

With Intel® Remote Secure Erase for Intel® Solid State Drives managed by Intel® Active Management Technology (Intel® AMT), wipe SSD media and delete encryption keys faster and e�ciently without having to spend time or money in doing so.

18 19

Hard Drive Retention

Lenovo Hard Disk Drive Retentionservice o�ers hardware maintenanceor maintenance upgrade coveragein an electronic format. If the internalhard disk drive (HDD) or internal solidstate drive (SSD) fails during warranty,Hard Disk Drive Retention lets customerskeep the old drive to retain sensitive datawithin the organization.

Click here to explore Lenovo's Security Solutions

Page 11: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Lenovo SolutionsThe Lenovo ThinkPad X1 Series comes with a built-in setof technologies that prevents unauthorized access to thecompany PCs. It involves a powerful combination of biometricand secondary identification that provides unprecedented security.

Series Di�erentiators

Built for the agile worker, the ThinkPadX1 Yoga allows users to work in themode that best suits them and theirenvironment. They can leave theirsecurity worries behind with theThinkShutter camera cover whiledata privacy is ensured with a securelogin using the integrated fingerprintreader and facial recognition features.

ThinkPad X1 Yoga

For workers on the go, the X1 Tablet is themost nimble device they can ask for.Whether brainstorming or moving frommeeting to meeting, ideas will always staysecure with the touch fingerprint reader andoptional IR camera with facial recognition.

ThinkPad X1 Tablet

20 21

For the road warriors who get the jobdone wherever life takes them, theultralight and ultrathin X1 Carbon is anessential equipment. It comes withpremium integrated security featureslike facial recognition and fingerprintreader to protect and keepout unwanted users.

ThinkPad X1 Carbon

Click here to explore Lenovo's Security Solutions

-Multi factor authentication powered by Intel® Authenticate-Remote data wipe powered by Intel® AMT-ThinkShutter camera to ensure privacy

Page 12: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Lenovo SolutionsCombining security and productivity features with a simpledesign, powerful technology, and long battery life, V Serieslaptops are perfect for business owners and frequentbusiness travelers.

Series Di�erentiators

-Ensure privacy with built in camera shutter-Access control with touch type fingerprint reader-Restrict unauthorized access with discrete TPM chip

Whether work takes an employeedown the road or across the globe,the V730 keeps business travel light.And data security is never a worrywith discrete TPM 2.0 security andtouch type fingerprint reader*.

Lenovo V730

*Optional

Click here to explore Lenovo's Security Solutions

22 23

Lenovo V330

*Optional

Multitasking workers – no matter wherework takes them – are at their productivebest with the V330. They never needto worry about security again, thanksto the touch type fingerprint reader*and privacy camera cover.

Page 13: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Lenovo SolutionsA range of security features are available on LenovoThinkCentre Series to protect against theft of datafrom the USB and other access ports on companyPCs, while also preventing unauthorized physicalmovement of devices.

24 25

ThinkCentre desktops come with a range of USB ports to suitany individual's productivity needs. While it can support multipledevices, it is susceptible to physical theft of the desktop andcomponents. The ThinkCentre can be secured with a chassislock to ensure there is no unauthorized physical movementof the device or its components.

ThinkCentre Series

Click here to explore Lenovo's Security Solutions

Series Di�erentiators

-Restrict port access with smart USB protection-Lock device physically with chassis lock-Prevent hacking with Trusted Platform Module

Page 14: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

V Series desktops are built to ensure security. They havesmart USB ports that prevent data theft and the entryof malicious software. Access to the cover and chassiscan also be restricted using a padlock and prevent harddrive access and theft of components.

Lenovo V Series Desktops

Lenovo SolutionsSimple, Powerful and Secure, Lenovo V Series desktops o�er features that make them a top choice for growing businesses that rely on performance and productivity.

Series Di�erentiators

-Restrict port access with smart USB protection-Lock device physically with chassis lock-Prevent hacking with Trusted Platform Module

Click here to explore Lenovo's Security Solutions

2726

Page 15: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

The Lost & Found service of Lenovo Absolutecombines software from Absolute and securitytools from Lenovo with additional alerts thatmake it easy to return missing PCs to theirregistered owners. Absolute’s software tracksthe stolen computer and provides local policewith the information they need to trace it.

2928

The global strategic partnership of MobileIron enterprise mobility management platform and Lenovo ensure secure provisioning and simplifies management of the endpoint devices. The features of MobileIron includes:

One platform to secure devices

75% faster to provision settingsand secure devices

Endpoint, network,app and cloud security

to explore Lenovo's Security SolutionsClick here

MobileIron

Page 16: Protect Your Business with Proven Security Solutions...Secure, automatic, and e˝cient data backup goes a long way in keeping your business processes running smoothly and without disruption

Brand-Specific Trademark Acknowledgment Line

Intel and the Intel logo are trademarks of Intel Corporation orits subsidiaries in the U.S. and/or other countries

Trusted aroundthe world

Expertise acrosscategories

Choose Lenovowith confidence

Business-boostingtechnology

Flexible supportnetwork

reasons why Lenovo is a di�erence maker

Serious security threats are everywhere In this mobile data drivenworld, stolen devices, data theft, ransomware, software vulnerabilities,cloud hacks – the list keeps on increasing every day.

Lenovo's 360 security strategy assists you to adopt cutting-edgesecurity features built into the entire range of Lenovo productsand solutions.

Conclusion