Today, more than half of data breaches start with misused or stolen user credentials1. Eight character passwords that change every 90 days worked well a decade ago, but increasingly sophisticated attack methods like password cracking, phishing, or screen scraping, reveal the need for stronger identity protection. To better protect user credentials, organizations need to strengthen software-only security.
Intel is leading the way with a new kind of multifactor authentication where PCs are an integral part of the solution. Intel® Authenticate Technology on the 6th generation Intel® Core™ vPro™ processor is a multifactor authentication solution that strengthens identity protection for the enterprise. It supports combining a variety of hardware-enhanced factors at the same time to validate a user’s identity, including ‘something you know’ (such as a PIN); ‘something you have’ (such as a mobile phone); and ‘something you are’ (such as a fingerprint). You can tailor the combination of hardened identity factors based on what works best for your business.
With Intel® Authenticate Technology, PIN, biometrics, keys, tokens and associated certificates are captured, encrypted, matched, and stored in the hardware, out of sight and reach from typical attack methods.
Intel® Authenticate Technology enables flexible policy configuration and enforcement using familiar PC management features and centralized tools. Policy administration, application distribution, and related fleet management all operate per your usual business processes. The solution is compatible with common IT policy management tools, including:
Your workers can combine available factors such as fingerprint, protected PIN, and phone proximity, which enable:
This ABI Research white paper reviews today’s enterprise vulnerabilities in an increasing threat cyber landscape while providing guidance for budget-appropriate multifactor biometric-based identity authentication solutions.
Designed for business with reliable, high-speed storage partnered with advanced security capabilities.
The 2015 Data Breach Investigations Report (DBIR) by Verizon*, http://www.verizonenterprise.com/DBIR/2015/.