SlideShare a Scribd company logo
1 of 10
Download to read offline
CLOUD SECURITY:
    Secure Your Data




1
Explosive Growth

                       Rapid growth in users,
                       devices, and data is leading to
                       increased reliance on the
                       cloud.




2
Love the cloud,                                                             MALWARE                                     CYBER ATTACKS
                  but worried about
                  security?                                                                   MILLION                                     MILLION
                                                                                              new malware samples per                     U.S. cyber attacks per day2
                  Many companies see the                                                      quarter1
                  benefits of cloud
                  computing but continue
                  to worry about securing
                  their data.




    1   “McAfee Threats Report: Second Quarter 2012,” McAfee, www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2012.pdf (PDF)
    2   Koebler, Jason, “U.S. Nukes Face Up to 10 Million Cyber Attacks Daily ,” U.S. News & World Report (2012),
3       www.usnews.com/news/articles/2012/03/20/us-nukes-face-up-to-10-million-cyber-attacks-daily
It’s a tough choice


                          Data encryption offers a viable
                          solution for protecting your data.
                          But software-based encryption can
                          cause significant performance slow-
                          downs.
                          ENCRYPTION                    PERFORMANCE




                          Encryption can protect your   …but may hurt your
                          data….                        performance.


                          WHAT’S AN IT MANAGER TO DO?

4
Intel has the solution




    Hardware-assisted security technologies                            Intel AES-NI1 enhances encryption                               OpenSSL helps data to move safely
    can help keep your data safe in the cloud.                         performance so you don’t have to                                across secure connections. Intel software
                                                                       choose between data security and                                optimizations improve HTTPS/SSL
                                                                       system performance.                                             performance.



    The result? More secure data and connections. Stronger performance.
    1 Intel®
           AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available
    on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series. For availability, consult your reseller
5   or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni?wapkw=aes-ni
Confidence in the results


                                                                                     Better secure your data, without
                                                                                     compromising system performance.
                                                                                                                               accelerated AES encryption performance by

                                                                                                up to   8x                     Intel® AES-NI, built into the latest Intel® Xeon®
                                                                                                                               processors1




                                                                                        up to    33x                           faster decryption by Intel® AES-NI versus
                                                                                                                               software-only approaches1



                                                                                                                               system level performance improvement

                                                                                     up to   4.8x                              with Intel AES-NI and Intel optimized SSL on
                                                                                                                               Intel Xeon processors1

                                                                                     Software and workloads used in performance tests may have been optimized for performance only on Intel
                                                                                     microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific
                                                                                     computer systems, components, software, operations and functions. Any change to any of those factors
                                                                                     may cause the results to vary. You should consult other information and performance tests to assist you in
                                                                                     fully evaluating your contemplated purchases, including the performance of that product when combined
                                                                                     with other products. For more information go to http://www.intel.com/performance

    1 Intel’s
           cryptographic optimizations speed up the handshake and the bulk data transfer phases of OpenSSL. The performance gains were measured on a dual Intel® Xeon® Processor
    X5680 [15] system, which consists of two 6-core Intel® processors based on the 32-nm microarchitecture, supporting the Intel® AES New Instructions (Intel® AES-NI) extension. We
    measured the performance gains for OpenSSL using the built-in speed test, as well as at the system-level running an Apache web server sending HTTP over SSL to clients on a
6   network. Source: http://download.intel.com/design/intarch/papers/326232.pdf . OpenSSL versions 1.0.0d and a snapshot of the upcoming 1.0.1 version containing all of Intel’s
    cryptographic optimizations; Apache version httpd-2.2.17; Intel® Xeon® Processor X5680 EP with two processors (3.3 GHz, 12M Cache, 6.40 GT/s Intel(R) QPI).
McAfee builds your confidence

                         • McAfee offers multiple layers
                           of data protection:
                            DATABASE / APPLICATIONS / SERVERS
                         • Confidence to migrate data safely between
                           workloads




                                             McAfee SECURE
                          The result?
                          More secure data at rest, in use, and in motion.


7
Move to the cloud with confidence



                                    Intel & McAfee:
                                    BETTER TOGETHER



                                    More secure data
                                    and connections.
                                    Stronger performance.


                                    More secure data
                                    at rest, in use,
                                    and in motion.


8
We’ll help you get                 The economic incentives for
    started                            online malicious cyber activity
                                       have grown. There's a whole
                                       economy around it, where
                                       people are actually writing tools
                                       to generate exploits and
                                       malicious code and selling those
                                       tools.
                                       Malcolm Harkins
                                       Intel Vice President of Information Technology Group
                                       and Chief Information Security Officer




                         DOWNLOAD NOW!
                         Download the Cloud Security Planning Guide and
                         discover valuable information on how to protect
                         YOUR data, from device to data center.
                         http://www.intel.com/content/www/us/en/cloud-computing
                         /cloud-security-checklist-planning-guide.html



9
Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document.
Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of
Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are
not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice.

Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries.

More Related Content

More from Intel IT Center

INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMGIntel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMGIntel IT Center
 
Gobblin for Data Analytics
Gobblin for Data AnalyticsGobblin for Data Analytics
Gobblin for Data AnalyticsIntel IT Center
 

More from Intel IT Center (20)

INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMGIntel® Xeon® Processor E5-2600 v4 Product Family EAMG
Intel® Xeon® Processor E5-2600 v4 Product Family EAMG
 
Gobblin for Data Analytics
Gobblin for Data AnalyticsGobblin for Data Analytics
Gobblin for Data Analytics
 

Cloud computing security secure your data

  • 1. CLOUD SECURITY: Secure Your Data 1
  • 2. Explosive Growth Rapid growth in users, devices, and data is leading to increased reliance on the cloud. 2
  • 3. Love the cloud, MALWARE CYBER ATTACKS but worried about security? MILLION MILLION new malware samples per U.S. cyber attacks per day2 Many companies see the quarter1 benefits of cloud computing but continue to worry about securing their data. 1 “McAfee Threats Report: Second Quarter 2012,” McAfee, www.mcafee.com/us/resources/reports/rp-quarterly-threat-q2-2012.pdf (PDF) 2 Koebler, Jason, “U.S. Nukes Face Up to 10 Million Cyber Attacks Daily ,” U.S. News & World Report (2012), 3 www.usnews.com/news/articles/2012/03/20/us-nukes-face-up-to-10-million-cyber-attacks-daily
  • 4. It’s a tough choice Data encryption offers a viable solution for protecting your data. But software-based encryption can cause significant performance slow- downs. ENCRYPTION PERFORMANCE Encryption can protect your …but may hurt your data…. performance. WHAT’S AN IT MANAGER TO DO? 4
  • 5. Intel has the solution Hardware-assisted security technologies Intel AES-NI1 enhances encryption OpenSSL helps data to move safely can help keep your data safe in the cloud. performance so you don’t have to across secure connections. Intel software choose between data security and optimizations improve HTTPS/SSL system performance. performance. The result? More secure data and connections. Stronger performance. 1 Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series. For availability, consult your reseller 5 or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni?wapkw=aes-ni
  • 6. Confidence in the results Better secure your data, without compromising system performance. accelerated AES encryption performance by up to 8x Intel® AES-NI, built into the latest Intel® Xeon® processors1 up to 33x faster decryption by Intel® AES-NI versus software-only approaches1 system level performance improvement up to 4.8x with Intel AES-NI and Intel optimized SSL on Intel Xeon processors1 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance 1 Intel’s cryptographic optimizations speed up the handshake and the bulk data transfer phases of OpenSSL. The performance gains were measured on a dual Intel® Xeon® Processor X5680 [15] system, which consists of two 6-core Intel® processors based on the 32-nm microarchitecture, supporting the Intel® AES New Instructions (Intel® AES-NI) extension. We measured the performance gains for OpenSSL using the built-in speed test, as well as at the system-level running an Apache web server sending HTTP over SSL to clients on a 6 network. Source: http://download.intel.com/design/intarch/papers/326232.pdf . OpenSSL versions 1.0.0d and a snapshot of the upcoming 1.0.1 version containing all of Intel’s cryptographic optimizations; Apache version httpd-2.2.17; Intel® Xeon® Processor X5680 EP with two processors (3.3 GHz, 12M Cache, 6.40 GT/s Intel(R) QPI).
  • 7. McAfee builds your confidence • McAfee offers multiple layers of data protection: DATABASE / APPLICATIONS / SERVERS • Confidence to migrate data safely between workloads McAfee SECURE The result? More secure data at rest, in use, and in motion. 7
  • 8. Move to the cloud with confidence Intel & McAfee: BETTER TOGETHER More secure data and connections. Stronger performance. More secure data at rest, in use, and in motion. 8
  • 9. We’ll help you get The economic incentives for started online malicious cyber activity have grown. There's a whole economy around it, where people are actually writing tools to generate exploits and malicious code and selling those tools. Malcolm Harkins Intel Vice President of Information Technology Group and Chief Information Security Officer DOWNLOAD NOW! Download the Cloud Security Planning Guide and discover valuable information on how to protect YOUR data, from device to data center. http://www.intel.com/content/www/us/en/cloud-computing /cloud-security-checklist-planning-guide.html 9
  • 10. Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice. Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries.