La versione del browser in uso non è consigliata per questo sito.Prendere in considerazione l'aggiornamento alla versione più recente del proprio browser facendo clic su uno dei link seguenti.
Questo PDF è disponibile solo per il download
Protect Sensitive Data on Laptops: Now More Important Than EverData breaches continue to increase in number and cost Businesses have access to many robust security solutions. These include anti-virus applications, intrusion prevention systems (IPSs), and intrusion detection applications, as well as encryption, data loss prevention (DLP) solutions, and authentication applications (identity and access management solutions). Yet, with all the security applications and approaches available today, companies are still vulnerable to data loss and theft. In fact, according to a 2010 Ponemon Institute benchmark study, the average laptop has about a 7 percent chance of being lost or stolen. Businesses are struggling not only to protect sensitive data, but also to prove compliance with increased security regulations in both Europe and North America.Sensitive data is still increasingly vulnerable Many factors contribute to the continued rise in data breaches, including:• More sophisticated equipment and software applications for hackers. With less investment, it’s easier to break through security and commit data breaches.• An increasingly mobile workforce. As users become more mobile, laptops—and their data—are more exposed to loss and theft. • Laptops are often shared in environments such as data centers, schools, and customer service centers. Sharing laptops among many users not only makes sensitive data more vulnerable to loss or theft, but it also puts data at greater risk of unauthorized access.• Bulk shipments of laptops. The military, government agencies, and educational organizations are particularly vulnerable to laptop theft during transport.• Expensive assets. Customized telecommunications laptops for field technicians. As a result, their sensitive data are at greater risk of exposure.• Security applications installed at the OS or BIOS level. These can be robust solutions, but are at risk of being circumvented or disabled.• Security credentials are often stored in software.Read the full Protect Sensitive Data on Laptops White Paper.
Download del PDF
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.
Animation on McAfee ePO Deep Command*.
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with embedded security and helps CompuCom reduce customers’ costs while increasing security and productivity.
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.