Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp



Similar documents
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

with PKI Use Case Guide

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Intel vpro Technology Module for Microsoft* Windows PowerShell*

PC Solutions That Mean Business

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Service Assurance Administrator. Product Overview

Intel Trusted Platforms Overview

CLOUD SECURITY: Secure Your Infrastructure

Intel Platform and Big Data: Making big data work for you.

McAfee epolicy Orchestrator * Deep Command *

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Intel Remote Configuration Certificate Utility Frequently Asked Questions

How To Get A New Computer For Your Business

Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration

Intel Media SDK Library Distribution and Dispatching Process

Intel Embedded Virtualization Manager

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Fast, Low-Overhead Encryption for Apache Hadoop*

Intel Desktop Board DG43RK

Intel System Event Log (SEL) Viewer Utility

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Intel Desktop Board D945GCPE

What is a Managed Service Provider (MSP)? What is the best solution for an MSP?

Intel Desktop Board DG41BI

Intel SSD 520 Series Specification Update

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Intel Desktop Board DQ43AP

Intel Desktop Board D945GCPE Specification Update

Intel vpro Technology. Common-Use Guide. For the Kaseya IT Automation Platform* Introduction

Software Token Security & Provisioning: Innovation Galore!

Intel Desktop Board DG41TY

Intel Desktop Board DG41WV

Intel Desktop Board DG31PR

Intel Desktop Board DQ35JO

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

System Image Recovery* Training Foils

Life With Big Data and the Internet of Things

Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study

Intel Desktop Board DP55WB

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Benchmarking Cloud Storage through a Standard Approach Wang, Yaguang Intel Corporation

Getting Ahead of Malware

Intel Desktop Board DG33TL

Intel Management and Security Status Application

Intel Desktop Board D945GCL

Overcoming Security Challenges to Virtualize Internet-facing Applications

Intel Xeon Processor E Product Family

Intel Server Raid Controller. RAID Configuration Utility (RCU)

Intel: a Thought Leader Helping IoT Scale Out

Trusted Platform Module (TPM) Quick Reference Guide

Intel RAID Volume Recovery Procedures

The Business Case for Security Information Management

Accelerating Business Intelligence with Large-Scale System Memory

Keep Data Secure with Intelligent Client-Side Protection for Lost or Stolen Laptops

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Citrix and Intel Deliver Client Virtualization

Intel Desktop Board DG965RY

Chrome OS*-Based Devices in the Enterprise

* * * Intel RealSense SDK Architecture

Intel Desktop Board DG43NB

Intel Desktop Board DP43BF

Intel Desktop Board DQ965GF

Scaling up to Production

Isaku Yamahata CloudOpen Japan May 22, 2014

Big Data. Value, use cases and architectures. Petar Torre Lead Architect Service Provider Group. Dubrovnik, Croatia, South East Europe May, 2013

Intel Virtualization Technology (VT) in Converged Application Platforms

Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum

High Performance Computing and Big Data: The coming wave.

Accelerating Business Intelligence with Large-Scale System Memory

Running Windows 8 on top of Android with KVM. 21 October Zhi Wang, Jun Nakajima, Jack Ren

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel System Event Log (SEL) Viewer Utility

Configuring RAID for Optimal Performance

Intel Modular Server System MFSYS25

Creating Overlay Networks Using Intel Ethernet Converged Network Adapters

Tiny is the new BIG: Why go thin when you can go Tiny

Cloud based Holdfast Electronic Sports Game Platform

Intel System Event Log (SEL) Viewer Utility

Reference Architecture: Enterprise Security For The Cloud

Transcription:

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. Intel may make changes to specifications and product descriptions at any time, without notice. All products, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance Intel, Intel Inside, the Intel logo, Intel Core, and Xeon are trademarks of Intel Corporation in the United States and other countries. Security features enabled by Intel AMT require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, see http://www.intel.com/technology/manage/iamt. No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft Intel vpro Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro The original equipment manufacturer must provide TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be initialized and may not be available in all countries. Intel AES-NI requires a computer system with an AES-NI enabled processor, as well as non-intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/ *Other names and brands may be claimed as the property of others. Copyright 2011 Intel Corporation, All Rights Reserved

Agenda Trends and Landscape Challenges of Cyber Security Defense in Depth Strategy Layered Security Technology Innovations for Endpoint Protection Summary, Questions, Discussion 3

Industry Changes Drive Security Challenges are increasing over time. The risks-of-loss continues to rise as the cyber security industry grows in size, intensity, and complexity 4

Scope Businesses must find a balance through tradeoffs: Security aspects are intertwined: Threats Infrastructure & Business Processes Data Trusted Users

Defense in Depth Process to drive cost efficiency and security effectiveness Prediction Predict the most likely attacks, targets, and methods Defense in Depth Cyber Security Strategy Prediction: Proactive measures to identify attackers, their objectives and methods prior to materialization of viable attacks. Enables and maximizes Prevention activities. Information Security Strategy Prevention: Securing the computing environment with current tools, patches, updates, and best-known methods in a timely manner. Educating and reinforcing good user behaviors. Undermines most attacks. Detection: Monitoring of key areas and activities for attacks which evade prevention. Identifies issues, breaches, and attacks. Supports rapid interdiction by Response capabilities Prevention Prevents or deters attacks so no loss is experienced Response Rapidly address incidents to minimize losses and return to a normal state Response: Efficient management of efforts to contain, repair, and recover as needed to return the environment to normal operations. Reduces losses by rapidly addressing issues and feeds intelligence into Prediction and Prevention areas IT Strategy Detection Identify attacks not prevented to allow for rapid and thorough response

Layered Defense Necessary for comprehensiveness Firewalls, demilitarized zone, data loss prevention NETWORK Antivirus software, patching, minimum security specifications for systems PLATFORM APPLICATION FILE AND DATA Secure coding, security specifications File and data encryption, enterprise rights management 7

Innovation on the End-Point Attacks are Moving Down the Stack: Attacks disable security products, steal and control applications Compromise virtual machine Attacks against hardware and firmware affect the root-of-trust Applications Operating System Virtual Machine (Optional) Hardware Traditional attacks: Focused primarily on the application layer OS infected: Threats are hidden from security products New stealth attacks: Embed themselves below the OS and Virtual Machine, so they can evade current solutions 8

Innovation Security below the OS Sensors under the OS to detect stealth malware Passes data to Anti-Malware software to block, and remove Faster Encryption Hardware acceleration of encryption algorithms (up to 4x faster) improves user experience and productivity, while protecting data Whole-disk Encryption Internet Security File Storage Encryption Whole-disk Encryption Strengthening Data-Center Security and Control Attestation of VM and cloud security Out-of-Band security monitoring, management, and recovery Hardware Enhanced Authentication Eliminating the need for separate hardware tokens Faster software VPN login, for improved user experience and productivity Software VPN tokens instead of user passwords VPN Client SW Traditional hardware token Integrated into PC 9

Summary A well thought out cyber strategy is necessary to secure assets, operations, reputation, and competiveness Strive for achieving and maintaining the optimal balance of security for your organization Executive commitment and support is a prerequisite to success Two types of victims exist: those with something of value and those who are easy targets. Therefore: Don t be an easy target, and protect your valuables