Industry Steps Up to Hardware-Enhanced Endpoint Security, Multi-factor Identification

Check out the latest Intel IT Peer Network blog.

When talking about security threats that face companies today, I compare them to the difference between a gas leak in your home and carbon monoxide.

Gas companies put a scent in natural gas, so if there’s a leak you can smell it, and you know there’s a problem. Computer performance is like that. Users notice when their PC is running slower, they don’t like it, and they want to get the problem fixed.

A security issue is more like carbon monoxide. You can’t see it, you can’t smell it, and by the time you know you’ve got a problem, it’s too late.

Security breaches within businesses have become commonplace. There are now billions of cyber exploits every day, according to the 2017 Internet Security Threat Report by Symantec*. In 2016, these attacks were successful enough to expose over 1.1 billion identities, according to the same report. The bottom line is that 90 percent of security incidents result from exploits against software defects, according to a CSO report attributed to the U.S. Department of Homeland Security.1

2017 is on pace to set a new record for compromised identities, with more than 1,200 breaches recorded and 3.4 billion records exposed according to Risk Based Security’s Q1 2017 DataBreach QuickView Report. It’s not a matter of if a business will be attacked, but rather, when.

"A security issue is more like carbon monoxide. You can’t see it, you can’t smell it, and by the time you know you’ve got a problem, it’s too late."

Why Multifactor Identification Matters

There is now a more effective approach to identity and access management: multi-factor authentication anchored in silicon inside Intel®-based, enterprise PCs. With the Intel® Core™ vPro™ platform, our security solutions provide a unique, deeper layer of protection at the root of trust: the hardware component of the computing stack. While two-step authentication is certainly stronger than one, true multifactor authentication encompasses: 

  • Something you know, like a PIN
  • Something you are, like a fingerprint or some other biometric
  • Something you have, like a physical token or nearby device that can broadcast a Bluetooth signal

As a result, cyber criminals have a much harder time gaining access to a PC.

As part of migration to Windows® 10, companies can strengthen security today by upgrading to new devices powered by 7th Generation Intel® Core™ vPro™ processors with Intel® Authenticate deployed. This combination gives you customisable, hardware enhanced, multifactor authentication with biometrics, credentials and the IT policy engine all stored and executed securely in hardware – below the software layer where attacks are prevalent.

More than 50 PC designs have been optimised for Intel® Authenticate since its introduction in January 2016. Our hardware-enhanced solution supports a range of customisable, hardened factors to fit specific business needs and integrate easily into existing environments.

And there’s a bonus: Users love it because they don’t have to remember complex, ever-changing passwords.

Endpoint security doesn’t end with identity protection. We’re also aggressively innovating to make hardware the centre of data protection. The 7th generation Intel® Core™ vPro™ processor-based devices, announced in January 2017, support a new hardware-enhanced file encryption solution called Intel® Data Guard.

Intel® Data Guard lets IT centrally set policy on how and when to encrypt files, then execute that policy automatically on individual endpoints. IT has the flexibility to decide how and when files should be encrypted automatically (without any user action) or whether certain file types or folder locations can be encrypted at the user’s discretion. This dramatically reduces human error from the process, because users no longer are exclusively relied upon to remember to encrypt sensitive data. The result is less risk of data loss of sensitive company data.

The key to staying ahead of today’s ever-evolving security environment is to deepen your endpoint protections. Refresh older PCs with modern systems that feature hardware-based security defences that transform an endpoint problem into a key part of the solution.

*Other names and brands may be claimed as the property of others

Tom M. Garrison is a vice president in the Client Computing Group and general manager of Business Client Platforms at Intel Corporation. Garrison joined Intel in 1994. He holds a bachelor's degree in electrical engineering from Portland State University in Oregon.

For more information:

Finger pressing a button on a smart phone or tablet

Stay Connected

Stay connected to technologies, trends, and ideas that are shaping the future of the workplace with the Intel IT Center.

By submitting this form, you are confirming you are an adult 18 years or older and you agree to Intel contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Intel’s web sites and communications are subject to our Privacy Notice and Terms of Use.

Related Articles

Get tough on security with hardware-hardened multi-factor authentication.

Learn more

Built for business, the latest generation processors will help power your enterprise to a profitable 2017.

Learn more