Click me
Transcribed

Stronger Security Down to the Core

STRONGER SECURITY DOWN TO THE CORE Today's mobile workforce can be productive from virtually anywhere and at any time. Mobility has a cost, though, exposing business data to more risk and increasing the potential for compromise. Ultrabooks equipped with 3rd Generation core Intel® Core vPro Processors are protected at the chip level for mobile productivity with maximum security. ..... .. •.... MALWARE THREATS CONTINUE EXPONENTIAL GROWTH More than EBB888888 8 million 11 million PCs new virus samples were detected in the second quarter of 2012-1.5 million more than the previous quarter.' were infected with Conficker at its peak. This pervasive threat still accounts for 14.8% of infection attempts detected.? .... ... More than 9 million 50%of 2$ $ Data breaches were 2$ PCs have been compromised caused by viruses, by ZeroAccess-a rootkit that steals financial and personal information. worms, Trojans, and 3 other malware. MOBILE PCS ARE EASILY LOST OR STOLEN 39% of organizations have experienced a data breach as a result of a lost or stolen device-including laptops and Ultrabooks.5 .... ...... 18.5 million identities were stolen in 2011 as a result of information compromised through loss or theft. 6 The average Percentage of laptops 263 30% number of laptops containing confidential or lost annually per sensitive data that use organization? encryption to protect it? DATA BREACHES ARE EXPENSIVE .... ....... $194 $5.5 million Average overall cost of a data breach Average cost of a breached file or record for an organization SECURITY POLICIES ALONE ARE NOT ENOUGH ... . v 47% 84% of users do not comply with security policies because they don't feel there is any risk.10 of companies believe that employees routinely or occasionally violate security and compliance policies." .... .··· ..... .. 3RD GENERATION INTEL® CORE™ VPRO™ PROCESSORS TM TM PROTECT YOUR ULTRABOOKS" AT THE CORE ENCRYPT DATA TO PREVENT COMPROMISE If the data stored on an Ultrabook is Ultrabooks equipped with 3rd Generation Intel® Core vPro processors have encrypted, it is protected against exposure stronger security built into the processor itself, providing protection even below or compromise from unauthorized users even if the PC is lost or stolen. Intel® vPro encrypts and decrypts data up to four times faster than previous Intel® chips. the operating system level. ..... ... .... .. ** MONITOR, UPDATE, AND PROTECT FROM AFAR STRONGER PASSWORD AND AUTHENTICATION PROTECTION You never really know where your roaming users might be working from with their Ultrabooks. Intel® vPro Technology Intel® vPro Technology uses tools like an exists in a pre-boot environment embedded in the hardware, enabling embedded one-time password, embedded public key infrastructure (PKI), and protected transaction display to provide stronger you to deploy security patches, manage security settings, and troubleshoot problems remotely. authentication and ensure that only authorized users can log in to the Ultrabook. CDW: PEOPLE WHO GET IT CDW solution architects are experts in PCs and mobile technology. Consult with CDW to find the right business Ultrabook configuration to meet your needs, and let CDW provide setup and ongoing support to help you get the most from your Ultrabook. Learn more at cdw.com/vpro. CDW РEOPLE WHO GET IT" SOURCES 1 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2012.pdf 2 http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report/html-04.aspx 3 http://nakedsecurity.sophos.com/2012/09/19/zeroaccess-botnet-uncovered/ 4 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid3biz_soc- med_twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 5 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid=biz_soc- med twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 6 http://www.symantec.com/threatreport/ 7 http://www.intel.com/content/dam/doc/white-paper/enterprise-security-the-billion-dollar-lost-laptop-problem-paper.pdf 8 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid%=biz_soc- med_twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 9 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid%=biz_soc- med twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 10 http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-503131.html %24 %24 STRONGER SECURITY DOWN TO THE CORE Today's mobile workforce can be productive from virtually anywhere and at any time. Mobility has a cost, though, exposing business data to more risk and increasing the potential for compromise. Ultrabooks equipped with 3rd Generation core Intel® Core vPro Processors are protected at the chip level for mobile productivity with maximum security. ..... .. •.... MALWARE THREATS CONTINUE EXPONENTIAL GROWTH More than EBB888888 8 million 11 million PCs new virus samples were detected in the second quarter of 2012-1.5 million more than the previous quarter.' were infected with Conficker at its peak. This pervasive threat still accounts for 14.8% of infection attempts detected.? .... ... More than 9 million 50%of 2$ $ Data breaches were 2$ PCs have been compromised caused by viruses, by ZeroAccess-a rootkit that steals financial and personal information. worms, Trojans, and 3 other malware. MOBILE PCS ARE EASILY LOST OR STOLEN 39% of organizations have experienced a data breach as a result of a lost or stolen device-including laptops and Ultrabooks.5 .... ...... 18.5 million identities were stolen in 2011 as a result of information compromised through loss or theft. 6 The average Percentage of laptops 263 30% number of laptops containing confidential or lost annually per sensitive data that use organization? encryption to protect it? DATA BREACHES ARE EXPENSIVE .... ....... $194 $5.5 million Average overall cost of a data breach Average cost of a breached file or record for an organization SECURITY POLICIES ALONE ARE NOT ENOUGH ... . v 47% 84% of users do not comply with security policies because they don't feel there is any risk.10 of companies believe that employees routinely or occasionally violate security and compliance policies." .... .··· ..... .. 3RD GENERATION INTEL® CORE™ VPRO™ PROCESSORS TM TM PROTECT YOUR ULTRABOOKS" AT THE CORE ENCRYPT DATA TO PREVENT COMPROMISE If the data stored on an Ultrabook is Ultrabooks equipped with 3rd Generation Intel® Core vPro processors have encrypted, it is protected against exposure stronger security built into the processor itself, providing protection even below or compromise from unauthorized users even if the PC is lost or stolen. Intel® vPro encrypts and decrypts data up to four times faster than previous Intel® chips. the operating system level. ..... ... .... .. ** MONITOR, UPDATE, AND PROTECT FROM AFAR STRONGER PASSWORD AND AUTHENTICATION PROTECTION You never really know where your roaming users might be working from with their Ultrabooks. Intel® vPro Technology Intel® vPro Technology uses tools like an exists in a pre-boot environment embedded in the hardware, enabling embedded one-time password, embedded public key infrastructure (PKI), and protected transaction display to provide stronger you to deploy security patches, manage security settings, and troubleshoot problems remotely. authentication and ensure that only authorized users can log in to the Ultrabook. CDW: PEOPLE WHO GET IT CDW solution architects are experts in PCs and mobile technology. Consult with CDW to find the right business Ultrabook configuration to meet your needs, and let CDW provide setup and ongoing support to help you get the most from your Ultrabook. Learn more at cdw.com/vpro. CDW РEOPLE WHO GET IT" SOURCES 1 http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2012.pdf 2 http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report/html-04.aspx 3 http://nakedsecurity.sophos.com/2012/09/19/zeroaccess-botnet-uncovered/ 4 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid3biz_soc- med_twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 5 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid=biz_soc- med twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 6 http://www.symantec.com/threatreport/ 7 http://www.intel.com/content/dam/doc/white-paper/enterprise-security-the-billion-dollar-lost-laptop-problem-paper.pdf 8 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid%=biz_soc- med_twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 9 http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf?om_ext_cid%=biz_soc- med twitter_facebook_marketwire_linkedin_2012Mar_worldwide__CODB_US 10 http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-503131.html %24 %24

Stronger Security Down to the Core

shared by rxleeds on Apr 09
224 views
1 shares
0 comments
This is the first of two companion infographics commissioned by CDW, Intel, and PCWorld to show off the new security features of the 3rd generation Intel Core VPro processors

Publisher

CDW

Source

Unknown. Add a source

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size