Cyberthreats, unfortunately, never take a holiday. In fact, with each passing day, attacks become more numerous, organized, powerful, and, with the explosion in smart devices and cloud-based systems, more opportunistic.
No wonder 50 percent of the 182 IT professionals who participated in Computerworld’s Forecast 2016 survey said they plan to increase spending on security technologies in the next 12 months. Security ran a close second after cloud computing as the most important technology project currently underway at their organizations.
Security’s ‘Perfect Storm’
Mike Seawright, director of security business development at Intel, discussed these challenges in Secure Your Business, our latest webinar in the Business Devices Webinar Series. Not only are IT security professionals facing increasing complexity with more devices and the shift to cloud computing, but they must act quickly, as organizations can be compromised in mere minutes, while utilizing limited staffing and budget resources.
The latest devices with Intel vPro technology offer a solid first line of defense in preventing threats. Built on Intel’s security technologies, each successive generation delivers evolutionary security capabilities. Intel Core vPro processors feature remote capabilities that allow scarce IT staff resources to maximize their efficiency in protecting compute devices across the enterprise.
What Aspects of Security Are Most Important?
Unfortunately, there is no easy strategy to take in IT security. “Security is complicated—sorry folks!” Mike said. To be truly secure, he explained, IT departments need to defend all areas against modern attacks: identity, platform, data, and applications.
However, Mike explained, a whopping half of all security breaches stem from identity and authentication gaps, so stronger authentication is a key part of security. Fortunately, Intel and Microsoft work collaboratively to combat security threats with user-friendly features and technologies such as True Key by Intel Security, Microsoft Credential Guard, and Intel Identity Protection Technology Multifactor Authentication.
These and other multifaceted defensive tactics and tools were explained in the hour-long webinar, which included a Q&A session. Here is a sample of what webinar participants had on their minds:
Q: I have health care clients. Do you have a security checklist?
Mike: Our health care team has a presentation you could use for this. Send me a note at firstname.lastname@example.org.
Q: Does True Key update itself?
Mike: True Key is like most software in that some portions will update automatically if that setting is applied. But then as we have major releases, it will usually require a user update.
Q: Are there any encryption key “manager” apps available for SMBs or partners that are acting as the IT department for multiple SMBs?
Mike: The McAfee ePolicy Orchestrator does a nice job of this. Another vendor to look at would be Venafi.
If you missed the webinar, you can listen in to the on-demand version available now and hear other questions and answers as well as download the presentation slides.
Ask a Question, Win a Tablet
This month, the lucky winners of a new Intel-based tablet and a new set of SMS Audio BioSport Smart Earbuds are Ed Goad of MeteorComm and D. Komnick of Advanced Business Technology Services, respectively. Congrats to both! And, if you didn’t win this time, you’ll have another chance to ask questions and win at the next webinar, which is sure to be a popular one: Introducing 6th Gen Intel Core vPro.
If you’ve already registered for the Business Devices Webinar Series, you’re all set: just click on the link in the reminder email you’ll receive a day or two before the event. But if you need to register, you can join our next webinar by clicking here.
With the latest Intel Core vPro processor-based devices, more businesses big and small can set and reach their New Year’s resolution to make their entire enterprise more secure.