Using Embedded Security to Support a More Mobile Workforce

When it comes to enabling mobility, IT professionals are facing a set of inevitabilities and challenges.

Among the inevitabilities:

  • Mobile use will continue to escalate dramatically.
  • Users will utilize a wide range of devices, some of which will be personally owned.
  • IT will bear the responsibility of preventing data breaches and attacks.

Among the challenges:

  • Those who engage in malicious behavior will continually seek new ways to exploit mobile security vulnerabilities.
  • Users will engage in behavior, often unawares, that will expose the enterprise to additional risks.
  • IT will shoulder the blame when things go wrong.

With more devices out there, more devices on the go and more users connected to the network from a wider range of entry points, there are simply more things that can go wrong -- if IT doesn’t put the proper safeguards in place. Hackers have more endpoints to attack and more ways to attack them.  Yet, hackers aren’t the only challenge for IT. According to Symantec’s Internet Security Threat Report 2014, far more data breaches are actually caused by the combination of organizations accidentally making confidential data public, and exposing data through theft or loss of a computer or drive. Part of the challenge for IT is to not only protect the organization from outside attacks, but to also protect the organization from itself.

One of the best ways to provide an extra layer of protection for mobile workers and devices is to ensure that any devices issued by the company are equipped with embedded security technologies, such as those incorporated in devices using Intel® Core™ vPro™ Processors.

With embedded protections in place, IT will be able to more easily secure data without affecting the user experience. In addition, IT will be able to utilize remote management capabilities to monitor, troubleshoot and remediate problems as they occur.

Here are some of the ways in which embedded technologies help IT to address their toughest mobile security challenges:

  • Deliver faster encryption: Embedded technologies enable IT to deploy faster methods of encryption, including automatic full-disk encryption, which do not affect the user experience or user productivity. Technology such as Intel AES New Instructions can encrypt data up to four times faster without affecting user productivity. Intel Secure Key makes data protection more secure by generating higher-quality random numbers.
  • Strengthen threat protection: Embedded technology can offer added protection against penetrating rootkits and malware below the operating system, which are difficult to detect and threaten users working in cloud or virtual environments.
  • Improve identity management: IT can deploy a “no password” mobile virtual private network experience, which simplifies password management and enhances the user experience. In addition, embedded technologies can support hardware-based storage of tokens or certificates.
  • Enhance device monitoring, troubleshooting and remediation: With embedded management and security technologies, IT personnel can access and manage any device in any location, resolving issues in any state of operation. IT can also centrally push security updates to users before a breach occurs, and can diagnose, isolate and repair infected clients after a breach.

It is inevitable that enhanced mobility will create new challenges for IT. But new challenges also mean new opportunities -- and for IT decision makers, embedded security technologies offer a huge opportunity to improve protection across the mobile enterprise.

Disclaimers:

  1. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors and may require additional software, hardware, services, and/or an internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.
  2. Intel® Advanced Encryption Standard-New Instructions (AES-N) requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information visit http//software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni
  3. No system can provide absolute security. Requires an Intel® Secure Key-enabled PC with a 3rd gen Intel® Core™ processor and software optimized to support Intel Secure Key. Consult your system manufacturer for more information.

© 2014 Intel Inc.