Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server"

Transcription

1 Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Intel delivers flexible, end-to-end data protection for retail point-of-sale transactions any device, anywhere, anytime. We re discovering between one to nine new pieces of malware every second. And this is basically being written by computers. Peter W. Singer, Brookings Institution Protecting consumer data is a 24/7 task that s critical for retailer success. It s also increasingly challenging to do well; as retail environments evolve, including new point-of-sale (POS) options available to the retailer, opportunities for those with malicious intent continue to rise. Improved credit/debit card authentication methods such as EMV implementation are helping to reduce fraudulent use of counterfeit credit cards. But none of these approaches address the basic issue of protecting the data itself, as evidenced by regular reports of fraud and theft that continue to plague consumers and retailers. Across the transaction industry, malware continues to frustrate commerce by infiltrating networks, exploiting security gaps, and stealing staggering amounts of transaction and personal information. Intel Data Protection Technology for Transactions closes this gap by creating a transaction path that directly routes data from the payment terminal to the bank s servers, encrypting sensitive personal information that bypasses the POS platform, its system memory and the POS operating system. Using a combination of hardware authentication and end-to-end encryption, Intel Data Protection Technology for Transactions is designed to secure both credit/debit and personal data from the moment a transaction is initiated all the way through the storage of the encrypted information on retailer and bank server networks. The Result: Consumer data is well-protected, malware attacks are more likely to be prevented, and retailers are set up with a flexible and future-proof solution that simplifies end-point

2 End-to-end encryption from card-acceptance at the peripheral through server delivery means plaintext data is never exposed to the POS operating system or to any applications including malware on the computing platform. authentication, reduces security worries, and increases POS choice. Strengthening Security in Open Platforms One of the most significant and persistent vulnerabilities in today s data-transaction environment is at the POS system. Built on open architectures, POS systems tablets, scanners, mobile and fixed payment terminals, and more are where transactional information is often processed and stored in plaintext format. This creates opportunities for successful malware attacks. Transactions tackles the issue of data exposure by separating transaction processing from the POS operating system, both physically and logically. This design has the net effect of securely isolating transactional data from start to finish, essentially rendering it inaccessible by the POS system, its memory, and its operating system. Bolstering Hardware Security with Software Transactions is a software download that is compatible with many retail systems built on today s and tomorrow s Intel processors, including Intel Core processors and the latest Intel Atom processor-based devices. Because it is software-enabled hardware security, Transactions offers retailers advanced levels of data security without the need for new hardware. In addition, Intel Data Protection Technology for Transactions is built on numerous Intel and McAfee technologies that provide trusted execution on the client and secure communications to remote management servers. As illustrated in Figure 1, these create a powerful solution for securing sensitive transactional data, end-to-end. Creating a trusted commerce flow According to a Solutionary report, organizations spend over $3,000 per day for up to 30 days in the aftermath of a malware attack. 2 And according to Michael Bruemmer, Vice President for Experian s Data Breach Resolution Group, recent large retail malware attacks have put hundreds of millions of credit/debit card numbers at risk in the United States alone. 3 CARD READER POINT OF SALE COMMAND CONSOLE Policies POS SOFTWARE PROTECTED APPLET Credit card data BANK Figure 1. Intel Data Protection Technology for Transactions provides unique chipsets and peripherals for retail payment solutions, including those using EMV, NFC, magnetic stripe, and PIN entry capabilities. Intel Data Protection Technology for Transactions also protects sensitive non-payment information. Intel Data Protection Technology for Transactions Retail Sector 2

3 One Record at a Time. That s how malware steals thousands even millions of consumer records. Malware can be aggressive, going into action immediately. It can also be patient, lying dormant for weeks, months, or years before waking up on a specific date or in response to a specific activity. In either case, transactional data sets are collected one-by-one, often ballooning into incredible multitudes of stolen records, wreaking havoc on commerce and consumer trust. Integration & Activation & Deployment Provisioning Equipment installed and connected Applet phones home to server, receives initial provisioning & policies Transactions helps mitigate these risks and their costs. Here are four key ways: End-to-end encryption of transaction information. End-to-end encryption from card-acceptance at the peripheral through server delivery means plaintext data is never exposed to the POS operating system or to any applications including malware on the computing platform. This increased transaction protection closes security gaps that have resulted in the theft of millions of credit/debit card numbers. Central management and updates. Intel Data Protection Technology for Transactions software regularly communicates with a command console to receive proactive configuration changes, credential updates and policy changes, as well as to upload current status and security telemetry data. Trusted Commerce Flow Pairing Transaction Management Peripherals pair with applet if and only if applet provisioning allows it Bank Card transactions are encrypted at the peripheral and policies route them to a bank server Applet phones home periodically for configuration updates & security metrics sharing Strict policy-driven access to transactional information. Intel Data Protection Technology for Transactions permits the controlled use of transaction data in accordance to specific policy. For example, POS processes may dictate that an expiration date is required to print a receipt, or only the birthdate from a given identification card be used to calculate an age (instead of releasing the entire record). By providing the POS with only the minimum information needed to maintain legacy processes (e.g., the last four digits of the credit card and the cardholder s name), Intel Data Protection Technology for Transactions maintains the utility of the POS while blocking memory scraping malware attacks. Whitelisting and authentication of secure devices. Confirming with whitelists provided by the retailer, the technology simplifies the deployment of authentication credentials at the fleet level across all deployed transaction assets. This is an effective protection against attacks whereby store assets are covertly replaced with compromised devices.

4 KEY CAPABILITIES FEATURE HOW IT WORKS BENEFIT Hardware Isolation Transactions uses a physically and logically isolated execution environment in the compute platform. Peripheral Whitelisting Server Connectivity Software-Enabled Hardware Security Common Ingredients Watchdog Timers Modular Flexibility Peripherals must authenticate and pass a whitelisting check with the POS before becoming part of the secure connection. Secure management channels are utilized to download configuration updates, modify policies, and share status data with the server. Using roots of trust in the Intel platform, the initial activation and provisioning can be securely performed with a remote server. Ingredients will function similarly on POS platforms from multiple vendors. Ingredients of managed assets will disable themselves if they haven t been able to reach a management server after a configured period of time. Transactions supports multiple peripherals and devices communicating with the platform, regardless of how they are connected (e.g., via USB, WiFi, Bluetooth low energy (BLE), etc.). Unintentional plaintext data is never exposed to the host CPU, operating system, or POS applications Data is better protected from memory-scraping malware attacks Peripherals introduced by attackers or from unknown origins cannot participate or process transactions Transactions-based POS devices won t accept data from unknown sources Reduces chances of social-engineering attacks Devices can be managed at the fleet level Can push changes based on changing security threats The technology can be easily activated on previously deployed POS assets, and shouldn t require hardware touches to the POS Investing in Transactions-capable and compatible devices ensures that the same tools can be used to manage the assets over time, regardless of vendor POS assets removed from the store or merchant network will disable their Intel Data Protection Technology for Transactions functionality, reducing the value of an attack Complex data flows can be easily enabled, allowing peripherals to interoperate McAfee Adds a New Layer of Data Protection McAfee Integrity Control blocks unauthorized applications and change on fixed-function POS systems. Combining industry-leading whitelisting with change-control technology, McAfee Integrity Control: Prevents out-of-policy changes while still allowing updates from authorized sources. Boosts control over change policies and effectively secures devices, even in standalone mode without network access. Is centrally-managed and efficient, eliminating the need to manage data in separate systems. Runs transparently and enables the entire POS infrastructure to be monitored without impact. Dynamically manages whitelists and supports multiple configurations for different business needs and devices. Is flexible, affordable, and secure. Intel Data Protection Technology for Transactions Retail Sector 4

5 Simply Secure and Complementary Keeping consumer data secure is absolutely critical for retailers; the consequences of not providing modern payment tools or neglecting sources of potential security breaches are too great to ignore. Transactions is a powerful new addition to retail s defenses against malicious attacks. Built to work with available transactionprocessing technologies including EMV, magnetic stripe, and near-field communication (NFC), Intel Data Protection Technology for Transactions complements protections retailers already have in place while simultaneously fortifying the entire transaction-security system. With Transactions, retailers are better able to meet consumer requirements for transaction security, and also meet their own requirements for POS manageability and adaptability that today s business demands. For more information, visit intel.com/transactiondataprotection or contact your Intel representative. 1. Demystifying Point-of-Sale Malware Attacks, Symanec Security Response Blog, Feb 2014 ( SERT Global Threat Intelligence Report, Solutionary, % of companies had a data breach in the past year, USA Today Tech, Sept 24, 2014 ( No computer system can provide absolute security. Requires an enabled Intel processor and software optimized for use of the technology. Consult your system manufacturer and/or software vendor for more information. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or byvisiting Intel s Web site at Copyright 2014 Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. Printed in USA 1014/MB/ICMCRC/PDF Please Recycle US

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology (IPT) Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright

More information

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations

More information

Intel Media SDK Library Distribution and Dispatching Process

Intel Media SDK Library Distribution and Dispatching Process Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media

More information

Cloud based Holdfast Electronic Sports Game Platform

Cloud based Holdfast Electronic Sports Game Platform Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online

More information

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide Opal* Compatibility Guide 1.0 Order Number: 331049-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL

More information

with PKI Use Case Guide

with PKI Use Case Guide Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

Intel SSD 520 Series Specification Update

Intel SSD 520 Series Specification Update Intel SSD 520 Series Specification Update June 2012 Revision 1.0 Document Number: 327567-001US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

Intel Remote Keyboard. User Guide

Intel Remote Keyboard. User Guide Intel Remote Keyboard User Guide INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS

More information

CLOUD SECURITY: Secure Your Infrastructure

CLOUD SECURITY: Secure Your Infrastructure CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED

More information

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Desktop Board DP55WB

Intel Desktop Board DP55WB Intel Desktop Board DP55WB Specification Update July 2010 Order Number: E80453-004US The Intel Desktop Board DP55WB may contain design defects or errors known as errata, which may cause the product to

More information

A Superior Hardware Platform for Server Virtualization

A Superior Hardware Platform for Server Virtualization A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations

More information

Intel Service Assurance Administrator. Product Overview

Intel Service Assurance Administrator. Product Overview Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011

Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Intel Core i5 processor 520E CPU Embedded Application Power Guideline Addendum January 2011 Document Number: 324818-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Fast, Low-Overhead Encryption for Apache Hadoop*

Fast, Low-Overhead Encryption for Apache Hadoop* Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

Intel Remote Configuration Certificate Utility Frequently Asked Questions

Intel Remote Configuration Certificate Utility Frequently Asked Questions Intel Remote Configuration Certificate Utility Frequently Asked Questions General Info 1. What operating system do I have to use to run the wizard? 2. What configurations are required prior to running

More information

Reducing PCI DSS Scope: The Gateway Approach

Reducing PCI DSS Scope: The Gateway Approach WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Ubuntu* Enterprise Cloud Executive Summary Intel Cloud Builder Guide Intel Xeon Processor Ubuntu* Enteprise Cloud Canonical*

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

Intel Solid-State Drive Optimizer

Intel Solid-State Drive Optimizer Intel Solid-State Drive Optimizer Getting the most out of your 34nm Intel X25-M and X18-M Solid-State Drive. White Paper Intel SSD Optimizer Abstract Today, when a user deletes a file from their system,

More information

Intel Network Builders

Intel Network Builders Intel Network Builders Nakina Systems Solution Brief Intel Xeon Processors Intel Network Builders Nakina Systems and Intel Make NFV Network Operational Introduction Every great generation of computing

More information

Specification Update. January 2014

Specification Update. January 2014 Intel Embedded Media and Graphics Driver v36.15.0 (32-bit) & v3.15.0 (64-bit) for Intel Processor E3800 Product Family/Intel Celeron Processor * Release Specification Update January 2014 Notice: The Intel

More information

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration Document Release Date: September 14, 2012 Revision History Revision Revision History

More information

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

Intel Data Direct I/O Technology (Intel DDIO): A Primer > Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.

Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1. Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*

More information

Intel Solid-State Drive Data Center Tool User Guide Version 1.1

Intel Solid-State Drive Data Center Tool User Guide Version 1.1 Intel Solid-State Drive Data Center Tool User Guide Version 1.1 Order Number: 327191-002 October 2012 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

iscsi Quick-Connect Guide for Red Hat Linux

iscsi Quick-Connect Guide for Red Hat Linux iscsi Quick-Connect Guide for Red Hat Linux A supplement for Network Administrators The Intel Networking Division Revision 1.0 March 2013 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH

More information

The Case for Rack Scale Architecture

The Case for Rack Scale Architecture The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Intel Desktop Board D945GCPE

Intel Desktop Board D945GCPE Intel Desktop Board D945GCPE Specification Update January 2009 Order Number: E11670-003US The Intel Desktop Board D945GCPE may contain design defects or errors known as errata, which may cause the product

More information

Software Solutions for Multi-Display Setups

Software Solutions for Multi-Display Setups White Paper Bruce Bao Graphics Application Engineer Intel Corporation Software Solutions for Multi-Display Setups January 2013 328563-001 Executive Summary Multi-display systems are growing in popularity.

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration

Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge

More information

Intelligent Business Operations

Intelligent Business Operations White Paper Intel Xeon Processor E5 Family Data Center Efficiency Financial Services Intelligent Business Operations Best Practices in Cash Supply Chain Management Executive Summary The purpose of any

More information

Deeper Levels of Security with Intel Identity Protection Technology

Deeper Levels of Security with Intel Identity Protection Technology WHITE PAPER Intel Identity Protection Technology Deeper Levels of Security with Intel Identity Protection Technology This technology is something you can take advantage of if your web site has a portal

More information

Intel Desktop Board DG41BI

Intel Desktop Board DG41BI Intel Desktop Board DG41BI Specification Update July 2010 Order Number: E88214-002US The Intel Desktop Board DG41BI may contain design defects or errors known as errata, which may cause the product to

More information

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Intel vpro Technology How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration Revision 1.4 March 10, 2015 Revision History Revision Revision History Date 1.0 First

More information

Intel Desktop Board DG43RK

Intel Desktop Board DG43RK Intel Desktop Board DG43RK Specification Update December 2010 Order Number: E92421-003US The Intel Desktop Board DG43RK may contain design defects or errors known as errata, which may cause the product

More information

Affordable Building Automation System Enabled by the Internet of Things (IoT)

Affordable Building Automation System Enabled by the Internet of Things (IoT) Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,

More information

Achieving a FIPS Compliant Wireless Infrastructure with Intel Wireless Products. Solution Brief

Achieving a FIPS Compliant Wireless Infrastructure with Intel Wireless Products. Solution Brief Achieving a FIPS Compliant Wireless Infrastructure with Intel Wireless Products Legal Disclaimer This document is provided as is with no warranties whatsoever, including any warranty of merchantability,

More information

Accelerate Your Ability to Create, Test, and Optimize Your Ideas

Accelerate Your Ability to Create, Test, and Optimize Your Ideas Selection Guide Accelerate Your Ability to Create, Test, and Optimize Your Ideas -based Workstations Which Workstation Best Meets Your Needs? Choosing a workstation that s up to your job demands is a smart

More information

Intel: a Thought Leader Helping IoT Scale Out

Intel: a Thought Leader Helping IoT Scale Out Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

Intel Desktop Board D945GCPE Specification Update

Intel Desktop Board D945GCPE Specification Update Intel Desktop Board D945GCPE Specification Update Release Date: July 11, 2007 Order Number: E11670-001US The Intel Desktop Board D945GCPE may contain design defects or errors known as errata, which may

More information

Intel Platform Controller Hub EG20T

Intel Platform Controller Hub EG20T Intel Platform Controller Hub EG20T General Purpose Input Output (GPIO) Driver for Windows* Order Number: 324257-002US Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Desktop Board DG41TY

Intel Desktop Board DG41TY Intel Desktop Board DG41TY Specification Update July 2010 Order Number E58490-006US The Intel Desktop Board DG41TY may contain design defects or errors known as errata, which may cause the product to deviate

More information

Solution Recipe: Improve Networked PC Security with Intel vpro Technology

Solution Recipe: Improve Networked PC Security with Intel vpro Technology Solution Recipe: Improve Networked PC Security with Intel vpro Technology Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM

WRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM TESTIMONY

More information

Intel Desktop Board DG31PR

Intel Desktop Board DG31PR Intel Desktop Board DG31PR Specification Update July 2010 Order Number: E30564-007US The Intel Desktop Board DG31PR may contain design defects or errors known as errata, which may cause the product to

More information

Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2. Presented by Martin Gannon June 21, 2015

Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2. Presented by Martin Gannon June 21, 2015 Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2 Presented by Martin Gannon June 21, 2015 Contents Questions and Answers from the Live Webinar... 3 About LANDesk Software... 5 To the maximum

More information

Benefits of Client-Side Virtualization

Benefits of Client-Side Virtualization SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer. Installation Guide This guide explains how to install an (Intel SSD) in a SATA-based desktop or notebook computer. The instructions include migrating your data from your current storage device (such as

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)

Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA) Intel HTML5 Development Environment Tutorial Test & Submit a Microsoft Windows Phone 8* App v1.00 : 04.09.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.

More information

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

Intel Data Migration Software

Intel Data Migration Software User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide

More information

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*

More information

IBM Security re-defines enterprise endpoint protection against advanced malware

IBM Security re-defines enterprise endpoint protection against advanced malware IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex

More information

RAID and Storage Options Available on Intel Server Boards and Systems

RAID and Storage Options Available on Intel Server Boards and Systems and Storage Options Available on Intel Server Boards and Systems Revision 1.0 March, 009 Revision History and Storage Options Available on Intel Server Boards and Systems Revision History Date Revision

More information

Intel RAID RS25 Series Performance

Intel RAID RS25 Series Performance PERFORMANCE BRIEF Intel RAID RS25 Series Intel RAID RS25 Series Performance including Intel RAID Controllers RS25DB080 & PERFORMANCE SUMMARY Measured IOPS surpass 200,000 IOPS When used with Intel RAID

More information

Target Security Breach

Target Security Breach Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected

More information

Intel Desktop Board DQ43AP

Intel Desktop Board DQ43AP Intel Desktop Board DQ43AP Specification Update July 2010 Order Number: E69398-005US The Intel Desktop Board DQ43AP may contain design defects or errors known as errata, which may cause the product to

More information

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software Real-Time Big Data Analytics with the Intel Distribution for Apache Hadoop software Executive Summary is already helping businesses extract value out of Big Data by enabling real-time analysis of diverse

More information

Intel Desktop Board D101GGC Specification Update

Intel Desktop Board D101GGC Specification Update Intel Desktop Board D101GGC Specification Update Release Date: November 2006 Order Number: D38925-003US The Intel Desktop Board D101GGC may contain design defects or errors known as errata, which may cause

More information

Intel Desktop Board DG41WV

Intel Desktop Board DG41WV Intel Desktop Board DG41WV Specification Update April 2011 Part Number: E93639-003 The Intel Desktop Board DG41WV may contain design defects or errors known as errata, which may cause the product to deviate

More information

Simplifying the Scope of the PCI Audit

Simplifying the Scope of the PCI Audit white paper Simplifying the Scope of the PCI Audit How an Identity-Aware Network Introduction The threshold for PCI compliance is simply a minimum standard. Retailers recognize that failure to satisfy

More information

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1

How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 Technical Brief v1.0 February 2013 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED

More information

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp. Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not

More information

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture

Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture White Paper Intel Xeon processor E5 v3 family Intel Xeon Phi coprocessor family Digital Design and Engineering Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture Executive

More information

Intel Matrix Storage Console

Intel Matrix Storage Console Intel Matrix Storage Console Reference Content January 2010 Revision 1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,

More information

Intel Desktop Board DP43BF

Intel Desktop Board DP43BF Intel Desktop Board DP43BF Specification Update September 2010 Order Number: E92423-004US The Intel Desktop Board DP43BF may contain design defects or errors known as errata, which may cause the product

More information

How High Temperature Data Centers and Intel Technologies Decrease Operating Costs

How High Temperature Data Centers and Intel Technologies Decrease Operating Costs Intel Intelligent Management How High Temperature Data Centers and Intel Technologies Decrease Operating Costs and cooling savings through the use of Intel s Platforms and Intelligent Management features

More information

Intel Simple Network Management Protocol (SNMP) Subagent v6.0

Intel Simple Network Management Protocol (SNMP) Subagent v6.0 Intel Simple Network Management Protocol (SNMP) Subagent v6.0 User Guide March 2013 ii Intel SNMP Subagent User s Guide Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

Intel 810 and 815 Chipset Family Dynamic Video Memory Technology

Intel 810 and 815 Chipset Family Dynamic Video Memory Technology Intel 810 and 815 Chipset Family Dynamic Video Technology Revision 3.0 March 2002 March 2002 1 Information in this document is provided in connection with Intel products. No license, express or implied,

More information

Selling Security to SMBs with 4 th gen Intel Core Processors

Selling Security to SMBs with 4 th gen Intel Core Processors Selling Security to SMBs with 4 th gen Intel Core Processors 1 After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is

More information

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Identity Protection Technology with PKI (Intel IPT with PKI) Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION

More information

Intel Technical Advisory

Intel Technical Advisory This Technical Advisory describes an issue which may or may not affect the customer s product Intel Technical Advisory 5200 NE Elam Young Parkway Hillsboro, OR 97124 TA-1054-01 April 4, 2014 Incorrectly

More information

WHITE PAPER. LVDS Flat Panel Display Interface on Intel Desktop Boards. July 2009 Order Number: E77911-001

WHITE PAPER. LVDS Flat Panel Display Interface on Intel Desktop Boards. July 2009 Order Number: E77911-001 WHITE PAPER LVDS Flat Panel Display Interface on Intel Desktop Boards July 2009 Order Number: E77911-001 Revision History Revision Revision History Date 1.0 Initial release of the LVDS Flat Panel Interface

More information

Intel X38 Express Chipset Memory Technology and Configuration Guide

Intel X38 Express Chipset Memory Technology and Configuration Guide Intel X38 Express Chipset Memory Technology and Configuration Guide White Paper January 2008 Document Number: 318469-002 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Intel Desktop Board D945GCL

Intel Desktop Board D945GCL Intel Desktop Board D945GCL Specification Update December 2007 Order Number D74277-004US The Intel Desktop Board D945GCL may contain design defects or errors known as errata, which may cause the product

More information

Revision History. Revision Revision History Date

Revision History. Revision Revision History Date G001 Revision History Revision Revision History Date 1.0 First release of the Intel NUC Home Theatre Personal Computer on the Linux* Mint Platform using XBMC May 2013 2.0 Second release of the Intel NUC

More information

McAfee and SAP HANA. Executive Summary. Real-Time Business Requires Real-Time Security

McAfee and SAP HANA. Executive Summary. Real-Time Business Requires Real-Time Security White Paper SAP HANA Intel Xeon Processor E7 Family Enterprise-class Security McAfee and SAP HANA Real-time, data-driven business with enterprise-class security Executive Summary There s an old saying:

More information

Advanced Security Methods for efraud and Messaging

Advanced Security Methods for efraud and Messaging Advanced Security Methods for efraud and Messaging Company Overview Offices: New York, Singapore, London, Tokyo & Sydney Specialization: Leader in the Messaging Intelligence space Market focus: Enterprise,

More information

http://www.intel.com/performance/resources Version 2008-09 Rev. 1.0

http://www.intel.com/performance/resources Version 2008-09 Rev. 1.0 Software Evaluation Guide for ImTOO* YouTube* to ipod* Converter and Adobe Premiere Elements* 4.0 Downloading YouTube videos to your ipod while uploading a home video to YouTube http://www.intel.com/performance/resources

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and

More information

Citrix and Intel Deliver Client Virtualization

Citrix and Intel Deliver Client Virtualization Citrix XenClient and Intel vpro Citrix and Intel Deliver Client Virtualization Citrix and Intel work together to deliver local virtual desktops, aiming to make virtualization ubiquitous on client devices.

More information