Security Flexibility That Flows Like Water

When I think about security solutions, a Bruce Lee quote springs to mind:

“You must be shapeless, formless, like water. When you pour water in a cup, it becomes the cup. When you pour water in a bottle, it becomes the bottle … Become like water, my friend.”

The point? The malware and hacker attacks of today are sophisticated, stealthy, patient, and purposeful. There’s always a new one around the corner, and your security solution needs to be fluid to match the constant flow of security strikes. Let’s take a look at how government security services think about the problem, and how Intel solutions provide answers.

Meeting Government Standards

There are two major forces at work when it comes to securing government data: existing infrastructures and emergent standards.

Existing security environments include Personnel Identity Verification (PIV) cards and Public Key Infrastructure (PKI). PIV cards are methods of storing and protecting physical and digital identity verification for workers that are moving in and out of a facility. PKI is like the control center of the security and encryption operation. These two systems working in tandem provide the backbone of your security plan.

Providers also need to meet the standards set down by the federal government, including the Federal Information Processing Standards (FIPS) 140-2 and NIST Special Publication 800-63-2. I won’t go into specifics here, but an important takeaway should be this: Whatever the data processing solution is, it should be optimized for both the architecture and the standards.

Our 6th Generation Intel Core vPro Solution

The built-in security features of the 6th generation Intel Core vPro processor family will enable federal agencies to strengthen their security foundations. The vPro framework has many features which allow for free-flowing and adaptive protection, including:

  • Trusted boot (ensures systems only boot in safe, uncompromised states)
  • Secure enclaves (protects hypersensitive information with additional layers of security)
  • Agent monitoring (selectively monitors and mitigates malware attacks)
  • Out-of-band management (allows for remote monitoring and protection of vital assets)

Intel vPro provides the tools to protect sensitive data and the systems that house it, and it does so by being adaptive and responsive. If you’d like to learn more, come chat with an Intel representative at the ATARC Federal Mobile Computing Summit on October 4th, or visit our solutions page.

Published on Categories SecurityTags , , ,
Steve Taylor

About Steve Taylor

Steve Taylor, Solution Technologist, Intel Federal LLC. During his 9 years with Intel® Corporation, Mr. Taylor has worked in their consulting organization, Business Client Platform Division working on their vPro Technology brand, and Intel Federal where he focuses on developing client and mobile security solutions for customers. Prior to joining Intel, Mr. Taylor spent 14 years developing secure and scalable wireless networks with systems integrators.