My colleague Dejan "Dan" Kusalovic contributed to an OnWindows article earlier this month on how businesses can leverage the latest technologies to manage their security in a more effective manner.
You may access the entire article from from OnWindows
It should be no surprise that we as a society have moved from a time and place where our data was secure. At least, we may have thought it was secure. But the data breaches we have seen in the last couple of years are the new normal. They will continue to occur. As individuals, we must do all that we can to make our data more secure. Corporations around the world must also fortify their security practices. Consumers clearly vote with their pocket book and will choose to do business with those corporations that embrace security as much as they do their product offerings.
Within financial services, the task seems to be ever more challenging. As new work flows and usage models usher in new technologies the IT manager faces ever increasing complexity of securing the network. Dan highlights that a major bank security officer shared with him that more than ten million hack attempts are made each month. WOW!
Intel has always been concerned about security, privacy and trust. These tenants makeup the core value proposition for Intel technology. I have had the privilege of working at Intel for more than 20 years and have always been proud of the technologies we bring to the market. Even more so now as Intel's best engineers are developing and enhancing security oriented products. In the article published by OnWindows Dan talks about two particular technologies. Identity Protection Technology and Trusted Execution Technology.
Intel's approach is secure a device not only through software but also through hardware. In particular, Intel's Identity Protection Technology provides a tamper-resistant hardware authentication mechanism. The technology on the client (PC or tablet) works in conjunction with websites that have enabled Identity Protection Technology to validate a legitimate user is logging in.
Trusted Execution Technology has been around for awhile in server processors. Financial Services and Retailers alike are interested in better understanding shopping, customer demographics and spending information. The information helps banks compare typical shopping and spending behaviors from non-typical or potentially fraudulent behaviors. However, this rich data is not only useful for the financial institutions but also to cyber-thieves. With Trusted Execution Technology, the IT department is able to create virtualized work space - further protecting against attacks.
Analyst predict that by end of 2015 there will be more than 10-billion connected devices. The vast majority of these devices will be connected to the internet. All of them capable of being hacked. What are you doing to safe guard your assets and digital identity? Check out the full suite Enhanced Data Protection with hardware-assisted security from Intel.