Identity and Access in an Increasingly Fragmented Environment

In today’s mobile business environment, strengthening and streamlining authentication is a critical part of protecting your network. Whether you’re securing VPN access or protecting access to software-as-a-service (SaaS) applications, a simple username and password solution is no longer enough. Many organizations have long deployed powerful authentication solutions using tokens or smart cards, or via software-only provisioning. However, recent data breaches have exposed vulnerabilities even with these baseline forms of account protection.

Screen Shot 2013-09-11 at 3.02.32 PM.png

Hardware-Based Authentication

Intel vPro processor technology offers two-factor authentication that provides a simple way for web sites and business networks to validate that an actual user—not malware—is logging in from a trusted PC. This hardware-based support helps protect enterprise access points while reducing costs and complexity over traditional hardware-token or smart-card methods.

For example, Intel Identity Protection Technology (Intel IPT) delivers hardware-secured VPN access by incorporating private keys, one-time password (OTP) tokens, and public key infrastructure (PKI) certificates. By eliminating the need for a separate physical token, it streamlines the VPN login process and, more importantly, ensures that the PCs accessing your VPN are those assigned to your employees. Because the credentials are secured inside the platform, the information cannot be compromised or removed from a particular PC.

Screen Shot 2013-09-11 at 3.04.15 PM.png

This blog is part 2 of 7 in a series focused on mobile security in the enterprise. For a full report, please click here.

Which 4th Gen Intel® Core™ processor best fits your business needs? Click here to use our convenient comparison tool.

For more conversations about IT Center and mobile security, click on the hashtags below:

#itcenter #security