strengthen your enterprise arsenal against cyber attacks with hardware-enhanced protection

15
JIM GORDON General Manager, PC & Platform Security Division Intel Corporation

Upload: intel-it-center

Post on 21-Jan-2018

103 views

Category:

Technology


0 download

TRANSCRIPT

JIM GORDONGeneral Manager, PC & Platform Security Division

Intel Corporation

Every Company is a Data Company

Heal

thca

re

Man

ufac

turin

g

Serv

ices

Data = The Enterprise Value of Any Company

Investment Typically Yields Return

Source: John Hopkins Bloomberg School of Publich HealthSource: GHT CoalitionSource: Globalfueleconomy.org

18.0

22.0

26.0

30.0

34.0

38.0

FUE

L E

CO

NO

MY

(MIL

ES

PE

R G

ALL

ON

)

US Fuel economy from 1995 – 2014

Domestic cars Light trucks

+32%

+21%

US Fuel Economy

Through 2025, drivers worldwide will save an ~$2 trillion on fuel

Healthcare / Vaccines

The net economic benefit of vaccination, in terms of additional productivity and treatment cost savings

(2011-2016) will be 16 times the investment.

$ $ $ $$ $ $ $

$ $ $ $$ $ $ $

$ $ $ $$ $ $ $

$ $ $ $$ $ $ $

$ $ $ $$ $ $ $$ $ $ $ROI up to

for every $1 invested

$44 $ =

Cyber Investment ROI Remains Negative

Source: Cybersecurity Ventures

$86.4 Billion in 2017*

Will Exceed $1 Trillion Cumulative by 2021

Cost of Cyber Crime to Hit $6 Trillion by 2021

Breaches with more than 10 million identities exposed 13 15

Total Identities Exposed

Source: Gemalto & Breachlevelindex.com

Yet Incidents & Costs Keep Rising

2015 2016 1H ‘2017*

Records Breached

564M 1.1B

708million

1.3billion

1.9billion

Core Issue

PRIVACY

ADAPTIVENESSREGULATORYCOMPLIANCE

USER EXPERIENCE

Identity Protection Remains a Balancing Act

It All Comes Down to TRUST

TRUST

Hardware-Enhanced Security

DISPLAYNETWORK MEMORY IO

83%

1 National Vulnerability Database report out 2014 : https://techtalk.gfi.com/most-vulnerable-operating-systems-and-applications-in-2014/2 Verizon 2016 Data Breach Investigation Report

OS Infected

1

HARDWARE

OPERATING SYSTEM

APPLICATIONS

13%1

14%

>63%network breaches involve compromised user credentials2

Software Alone is Not

Enough

Changing the Result Requires a

Different Approach

Intel’s Strategy: “Hardening”

Managed Enterprise

“Hardened”Data & Certificate

Management

“Hardened”Authentication &

Execution

“Hardened”IT Policy

Management

DISPLAYNETWORK MEMORY IO

HARDWARE

OPERATING SYSTEM

APPLICATIONS

Enterprise Identity: Intel® Authenticate

Hardware-Enhanced Multifactor Authentication Solution on Intel® Core™ vPro™ Processor Platforms

Enterprise Grade Identity Access Protection

Clie

nt

Network Devices

Intel® Authenticate

IT Console(s)

LocationBiometricsProximityPIN

Walk-away Lock

OS & Domain Logon VPN Login User Presence

Hardware-basedMultifactor Authentication

- SCCM- Active Directory

- McAfee* ePO

IT Policy(plugins)

Business-to-Consumer Authentication

Installed on a Consumer PC:

‘Built in’ 2-Factor Authentication

Secure payments, including protected biometrics

Hardened password management

Identity Ecosystem Powered by IntelFIDO 2-Factor Enterprise Multifactor

� Salesforce.com*

� Bank of America*

� Facebook*

� Google*

� Dropbox*

� Norton* by Symantec*

� Stripe*

� Enterprise Partners

� RSA*

� Citrix*

� Cisco*

� Juniper*

� DocuSign*

� Synaptics*

� North Carolina State

� University of Indiana

� University ofWashington

� University of NorthCarolina at Greensboro

� University of Texas

� Cornell University

� Carnegie MellonUniversity

� Intercede*

� HP*

� Lenovo*

*Other Trademarks and Brands are the properties of others

DEFENDEVERY LAYER DOWN TO THE CORE

HARDWARE-ENHANCED

SECURITY

LEARN MORE:

WWW.INTEL.COM/ENDPOINTSECURITY