Threat Management in an Enterprise Mobile Environment – Part 1 of 7

Enterprise Mobility Security Header pt 1.png

The threat landscape continues to grow dramatically, with sophisticated malware that’s frequently targeting enterprise data. Complicating the already dangerous threat landscape, the rise of BYOD programs has introduced additional mobile tools to the enterprise. And since users are now defining the network perimeter, it’s always moving.

In this new enterprise environment, you must find a way to protect an unknown number of mobile devices running on multiple platforms and operating systems, while keeping users productive and the business secure.

Protecting data and devices in a changing enterprise environment is no small task. It requires a comprehensive security solution that can guard against advanced threats while protecting users across a range of devices. 4th generation Intel Core vPro processors are designed to address the top IT security concerns for the enterprise: threat management, identity and access, data protection, and monitoring and remediation.

Threat Management

For IT, more devices mean there’s more to protect. And the environment is all the more threatening. Sophisticated malware and viruses continue to accelerate with no sign of slowing down. In fact, recent studies done by McAfee revealed some alarming facts from 2012.

Screen Shot 2013-09-11 at 1.52.58 PM.png

• New malware samples grew by 50 percent.


• Mobile malware increased by 44 times.


• New ransomware samples soared to over 200,000 per quarter.

These growth rates say a lot about what’s to come. And while many organizations are using traditional software-only security solutions, it may no longer be enough. Rootkit attacks, one of the most malicious forms of malware, can be difficult to detect with traditional antivirus strategies. These attacks give a hacker root-level access to a computer, which can occur without detection and proceed to infect key system components such as hypervisors. There’s also the risk of escalation-of-privilege attacks, in which a hacker can gain elevated network access to compromise sensitive business data across the organization.

Protected Launch Environment

Screen Shot 2013-09-11 at 2.31.42 PM.pngProtecting today’s virtual and physical IT environments against these advanced threats requires a different approach. Intel Core vPro technology actively helps to prevent viruses and malware from entering your network by creating a protected environment at start-up.

Intel Virtualization Technology (Intel VT) and Intel Trusted Execution Technology (Intel TXT) work below the operating system to validate the behavior of key client system components during boot-up and ongoing operations. Intel VT boosts security for virtual environments and works together with McAfee* Deep Defender* to protect against stealthy attacks like rootkits. And Intel OS Guard4 protects against escalation-of-privilege attacks by working constantly with automated protection that prevents viruses from taking hold deep in your system.


This blog is part 1 of 7 in a series focused on mobile security in the enterprise. For a full report, please click here.


For the most recent research on the state of business mobility, click here.


For more conversations about IT Center and mobile security, click on the hashtags below:

#itcenter #infosec