CLOUD SECURITY: Secure Your Infrastructure



Similar documents
Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Intel Identity Protection Technology (IPT)

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Service Assurance Administrator. Product Overview

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Industry Brief Healthcare Cloud Security

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

with PKI Use Case Guide

Security in the Cloud

新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)

Intel Platform and Big Data: Making big data work for you.

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

Improving OpenStack* Hybrid Cloud Security

Intel Embedded Virtualization Manager

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Life With Big Data and the Internet of Things

Intel Media SDK Library Distribution and Dispatching Process

Recovery BIOS Update Instructions for Intel Desktop Boards

Overcoming Security Challenges to Virtualize Internet-facing Applications

High Performance Computing and Big Data: The coming wave.

How To Reduce Pci Dss Scope

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Isaku Yamahata CloudOpen Japan May 22, 2014

Instructions for Recovery BIOS Update

Control your corner of the cloud.

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Desktop Board DG43RK

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel: a Thought Leader Helping IoT Scale Out

How To Get A Client Side Virtualization Solution For Your Financial Services Business

The Case for Rack Scale Architecture

Building Trust and Compliance in the Cloud with Intel Trusted Execution Technology

Intel Network Builders

Cloud based Holdfast Electronic Sports Game Platform

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

A Comprehensive Solution for API Management

Intel Desktop Board DQ43AP

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

Intel Desktop Board D945GCPE

Index. BIOS rootkit, 119 Broad network access, 107

Introducing the First Datacenter Atom SOC

Intel Desktop Board DG41BI

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Deeper Levels of Security with Intel Identity Protection Technology

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

How To Buy Nitro Security

Intel Platform Controller Hub EG20T

* * * Intel RealSense SDK Architecture

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

McAfee Security Architectures for the Public Sector

Intel vpro Technology Module for Microsoft* Windows PowerShell*

Intel Desktop Board D945GCPE Specification Update

Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture

Intel Desktop Board DP55WB

VNF & Performance: A practical approach

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Desktop Board DG41TY

Intel SSD 520 Series Specification Update

Intel Desktop Board DG41WV

Intel Desktop Board DG31PR

Securing the Intelligent Network

Logging and Alerting for the Cloud

Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux

Mobile-First Strategy. CIO Executive Interview

Adopting Software-Defined Networking in the Enterprise

Running Windows 8 on top of Android with KVM. 21 October Zhi Wang, Jun Nakajima, Jack Ren

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Imagine What Fitness Can Look Like in the Future

Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery

Software Token Security & Provisioning: Innovation Galore!

Intel Media SDK Features in Microsoft Windows 7* Multi- Monitor Configurations on 2 nd Generation Intel Core Processor-Based Platforms

Intel Trusted Platforms Overview

Intel Modular Server System MFSYS25

One-Stop Intel TXT Activation Guide

Intel Desktop Board DG31GL

Solving the Security Puzzle

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

Trusted Platform Module (TPM) Quick Reference Guide

Tiny is the new BIG: Why go thin when you can go Tiny

Citrix and Intel Deliver Client Virtualization

RAID and Storage Options Available on Intel Server Boards and Systems

McAfee epolicy Orchestrator * Deep Command *

Transcription:

CLOUD SECURITY: Secure Your Infrastructure 1

Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED REGULATION CONSUMERIZATION OF IT 2

Understanding the risks CLIENT ACCESS Growing diversity of client access devices increases the risk of illegitimate access by hackers or cybercriminals APIs Expanded attack surface created as apps are shared via APIs from cloud to mobile VIRTUAL WORKLOADS Security management tools are challenged by data center virtualization 3

Protect yourself CLIENT SECURITY Help protect client data so only authorized users can access the cloud TRUSTED COMPUTE POOLS Build trust and transparency in cloud infrastructure APPLICATION API CONTROL Manage APIs at the network edge where application services are consumed and exposed with partners, devices, and developers 4

Secure your clients Protection by Intel and McAfee Intel Identity Protection 1 Technology (Intel IPT) Hardware-based two-factor authentication for client access McAfee Cloud Identity Manager Federated single sign-on to cloud applications McAfee Deep Defender Monitors and roots out malware attacks below the operating system 5 1 No system can provide absolute security under all conditions. Requires an Intel Identity Protection Technology-enabled system, including a 2nd gen Intel Core processor enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit ipt.intel.com.

It s all all about trust Protect your data and workloads by establishing trusted compute pools using Intel Trusted 1 Execution Technology (Intel TXT). Provide a foundation for trust in cloud infrastructure by measuring integrity of virtualized infrastructure Protect data and workloads by deploying them on trusted virtualized infrastructure Create transparency to enable audit and governance in cloud deployments Intel TXT Intel TXT 6 1 No computer system can provide absolute security under all conditions. Intel Trusted Execution Technology (Intel TXT) requires a computer with Intel Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit intel.com/technology/security.

Application Layer Security Intel Expressway Service Gateway. Software appliance that acts as an API proxy where security policy is enforced, legacy applications & data are orchestrated, and mobile APIs are exposed to developer communities. 7

Move to the cloud with confidence Intel hardware-based security helps protect your infrastructure so you can feel more confident about moving to the cloud. More secure client access Trusted compute pools API controls at the edge 8

We ll help you get started It is no longer the case that security around the perimeter will hold. You have to assume that compromise is inevitable in any compute model. In order to manage the risk you have to set up a more granular trust model. Malcolm Harkins Intel Vice President of Information Technology Group and Chief Information Security Officer DOWNLOAD NOW! Download the Cloud Security Planning Guide and discover valuable information on how to protect YOUR data, from device to data center. http://www.intel.com/content/www/us/en/cloud-computing /cloud-security-checklist-planning-guide.html 9

Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Copyright 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries.