La versión del navegador que está utilizando no es aconsejable para este sitio.Considere actualizar a la última versión de su navegador haciendo clic en uno de los enlaces siguientes.
Lo sentimos, este PDF solo está disponible en formato para descarga
Protect Sensitive Data on Laptops: Now More Important Than EverData breaches continue to increase in number and cost Businesses have access to many robust security solutions. These include anti-virus applications, intrusion prevention systems (IPSs), and intrusion detection applications, as well as encryption, data loss prevention (DLP) solutions, and authentication applications (identity and access management solutions). Yet, with all the security applications and approaches available today, companies are still vulnerable to data loss and theft. In fact, according to a 2010 Ponemon Institute benchmark study, the average laptop has about a 7 percent chance of being lost or stolen. Businesses are struggling not only to protect sensitive data, but also to prove compliance with increased security regulations in both Europe and North America.Sensitive data is still increasingly vulnerable Many factors contribute to the continued rise in data breaches, including:• More sophisticated equipment and software applications for hackers. With less investment, it’s easier to break through security and commit data breaches.• An increasingly mobile workforce. As users become more mobile, laptops—and their data—are more exposed to loss and theft. • Laptops are often shared in environments such as data centers, schools, and customer service centers. Sharing laptops among many users not only makes sensitive data more vulnerable to loss or theft, but it also puts data at greater risk of unauthorized access.• Bulk shipments of laptops. The military, government agencies, and educational organizations are particularly vulnerable to laptop theft during transport.• Expensive assets. Customized telecommunications laptops for field technicians. As a result, their sensitive data are at greater risk of exposure.• Security applications installed at the OS or BIOS level. These can be robust solutions, but are at risk of being circumvented or disabled.• Security credentials are often stored in software.Read the full Protect Sensitive Data on Laptops White Paper.
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.
Animation on McAfee ePO Deep Command*.
Intel® Core™ processors secure mobility, online rich media, business operations.
Video from IT@Intel discusses the isolation of infected PCs and remediation with Intel® vPro™ Technology.
Multi-level security with Intel® Anti-Theft Technology in laptops with Intel® Core™ vPro™ technology
Learn how Intel® Core™ vPro™ processors using Intel® Anti-Theft technology protect lost or stolen PCs.