2 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED REGULATION CONSUMERIZATION OF IT 2
3 Understanding the risks CLIENT ACCESS Growing diversity of client access devices increases the risk of illegitimate access by hackers or cybercriminals APIs Expanded attack surface created as apps are shared via APIs from cloud to mobile VIRTUAL WORKLOADS Security management tools are challenged by data center virtualization 3
4 Protect yourself CLIENT SECURITY Help protect client data so only authorized users can access the cloud TRUSTED COMPUTE POOLS Build trust and transparency in cloud infrastructure APPLICATION API CONTROL Manage APIs at the network edge where application services are consumed and exposed with partners, devices, and developers 4
5 Secure your clients Protection by Intel and McAfee Intel Identity Protection 1 Technology (Intel IPT) Hardware-based two-factor authentication for client access McAfee Cloud Identity Manager Federated single sign-on to cloud applications McAfee Deep Defender Monitors and roots out malware attacks below the operating system 5 1 No system can provide absolute security under all conditions. Requires an Intel Identity Protection Technology-enabled system, including a 2nd gen Intel Core processor enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit ipt.intel.com.
6 It s all all about trust Protect your data and workloads by establishing trusted compute pools using Intel Trusted 1 Execution Technology (Intel TXT). Provide a foundation for trust in cloud infrastructure by measuring integrity of virtualized infrastructure Protect data and workloads by deploying them on trusted virtualized infrastructure Create transparency to enable audit and governance in cloud deployments Intel TXT Intel TXT 6 1 No computer system can provide absolute security under all conditions. Intel Trusted Execution Technology (Intel TXT) requires a computer with Intel Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit intel.com/technology/security.
7 Application Layer Security Intel Expressway Service Gateway. Software appliance that acts as an API proxy where security policy is enforced, legacy applications & data are orchestrated, and mobile APIs are exposed to developer communities. 7
8 Move to the cloud with confidence Intel hardware-based security helps protect your infrastructure so you can feel more confident about moving to the cloud. More secure client access Trusted compute pools API controls at the edge 8
9 We ll help you get started It is no longer the case that security around the perimeter will hold. You have to assume that compromise is inevitable in any compute model. In order to manage the risk you have to set up a more granular trust model. Malcolm Harkins Intel Vice President of Information Technology Group and Chief Information Security Officer DOWNLOAD NOW! Download the Cloud Security Planning Guide and discover valuable information on how to protect YOUR data, from device to data center. /cloud-security-checklist-planning-guide.html 9
10 Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Copyright 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries.
IT@Intel White Paper Intel IT IT Best Practices Cloud Computing and Information Security January 2012 Virtualizing High-Security Servers in a Private Cloud Executive Overview Our HTZ architecture and design
october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your
Small Logo How Does Fax over IP Work? A Discussion of the T.30 and T.38 Protocols and the Dialogic Brooktrout Fax Products Executive Summary This white paper briefly describes the T.30 and T.38 protocols,
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
BEST PRACTICES WHITE PAPER A path to improving the end-user experience By David Williams, Vice President of Strategy, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
ORACLE PRODUCT DATA HUB THE SOURCE OF CLEAN PRODUCT DATA FOR YOUR ENTERPRISE. KEY FEATURES Out-of-the-box support for Enterprise Product Record Proven, scalable industry data models Integrated best-in-class
This release connector is deprecated. Use Kofax Capture and the appropriate Kofax Capture release script to release documents to a specific destination. KOFAX Front-Office Server 2.7 Configuration Guide
WHITE PAPER Intel Solid-State Drives Increase Productivity of Product Design and Simulation Intel Solid-State Drives Increase Productivity of Product Design and Simulation A study of how Intel Solid-State
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
Cloud Deployment Guide Product Version: 1.2 Doc Rev 1.3 Last Updated: 15-Jan-15 Good Work TM Table of Contents Introduction What is the Cloud? 1 The Private Cloud 1 Good Work in the Cloud 1 Environment
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
An Oracle White Paper June, 2012 Provisioning & Patching Oracle Database using Enterprise Manager 12c. Table of Contents Executive Overview... 2 Introduction... 2 EM Readiness:... 3 Installing Agent...
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
IT@Intel Achieving Intel Transformation through IT Innovation 2014 2015 Intel IT Business Review Annual Edition The Transformative Power of Innovation Kim Stevenson Intel Chief Information Officer Contents
Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease
WHITEPAPER February 2014 3725-77704-001A RealPresence One Product Definition and Licensing Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)
TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category