Cloud and PCs Static Infographic 040418 › content › dam › insight-web › ... · Lenovo...

1
65% SMBs see shadow IT activities as threats to data security. 1 50% of SMBs delayed a Cloud implementation due to lack of cybersecurity skills. 1 84% of SMBs find data security to be the biggest concern related to Cloud computing. 2 CLOUD BURST Powered by Intel®. Intel Inside®. Powerful Productivity Outside. Brand-Specific Trademark Acknowledge Line Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. © 2018 Lenovo. All rights reserved. These products are available while supplies last. Prices shown are subject to change without notice. For any questions concerning price, please contact your Lenovo Account Executive. Lenovo is not responsible for photographic or typographic errors. Warranty: For a copy of applicable warranties, write to: Warranty Information, 500 Park O_ces Drive, RTP, NC 27709, Attn: Dept. ZPYA/B600. Lenovo makes no representation or warranty regarding third-party products or services. Trademarks: Lenovo, the Lenovo logo, Rescue and Recovery, ThinkPad, ThinkCentre, ThinkStation, ThinkVantage, and ThinkVision are trademarks or registered trademarks of Lenovo. Microsoft, Windows, and Vista are registered trademarks of Microsoft Corporation. Intel, the Intel logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries. Other company, product, and service names may be trademarks or service marks of others. Don't let malware flood your data More than half of SMBs shut down within 6 months of a data breach 1 . Surely, you don’t want to be one of them. So, clearly while selecting a Cloud strategy SMBs will look at the security aspects of the solutions intently. Lenovo offers robust built-in security and device management features across its endpoint device categories Cloud isn’t an option anymore. It is the way forward for all businesses. The next wave of digital revolution – artificial intelligence, robotics, Internet of Things, and Big Data analytics will be underpinned by Cloud. How firms protect "as-a-service" environments that are offered via Cloud deployment: (For PC/Tablet Users) Source: Forrester Data Global Business Technographics® Security Survey, 2017 Secure your data, but secure your devices first. Endpoint devices are a gateway to your organization’s data in the Cloud. With an increase in the number of mobile employees and remote workers, ensuring data safety has become even more challenging for organizations. So, choosing endpoint devices with built-in data security features and granting complete visibility and control to IT departments is essential. USER AUTHENTICATION: control the access to your data in the Cloud Multifactor Authentication using Intel® Authenticate: enforce user identity protection for access to the corporate domain, network, and VPN Biometric Authentication through Windows Hello and ThinkPad Glance: offers uncompromised security with advanced facial recognition and gaze tracking DEVICE AND DATA MANAGEMENT: enable your IT team to control and supervise endpoint devices Intel® Active Management Technology (Intel® AMT): prevent unsolicited access by remotely wiping the data on the disk drive using Remote Secure Erase Device Management using MobileIron: an industry leading EMM that provides security to endpoint devices, network, app, and Cloud PHYSICAL DEVICE SECURITY: prevent unauthorized access to your data and devices Smart USB Protect: allow data transfer through ports only for authorized personnel ThinkShutter: physically secure and cover the camera for additional privacy DATA PROTECTION: ensure device and data protection at multiple stages Lenovo Vantage: distinguishes between legitimate and malicious networks. Detects threats or attacks near the laptop and alerts IT Coronet: allows only trusted users, devices, networks, and Cloud services to access your data REMOTE DIAGNOSTICS AND RECOVERY: remotely manage, repair, and update endpoint devices Intel® Active Management Technology (Intel® AMT): enables IT to discover, repair, and help protect networked devices remotely Windows BitLocker: recover data from hard drive in case of device failure and prevent data breach by encrypting the hard drive Encrypt data before it moves to the Cloud 30% 25% 23% 23% 24% 32% 34% 22% 25% 24% Track movement of data to and within the Cloud Draft service level agreements with providers Perform regular security assessments of providers Get security certificates from "as-a-service" providers Limit unauthorized access to data and applications Identify sensitivity of data in the Cloud Use Cloud security gateways or Cloud access security brokers Use centralized Cloud workload security management Implement Cloud tokenization ThinkPad X1 Carbon ThinkPad X280 ThinkPad X1 Yoga ThinkCentre M910 SFF ThinkPad T580 Source: 1. https://www.onr.com/blog 2. http://www.inase.org “40% of SMBs* cite Security and Privacy as top concerns with cloud services” – Forrester Data Global Business Technographics® Software Survey, 2017 *SMBs = 1-999 employees

Transcript of Cloud and PCs Static Infographic 040418 › content › dam › insight-web › ... · Lenovo...

Page 1: Cloud and PCs Static Infographic 040418 › content › dam › insight-web › ... · Lenovo offers robust built-in security and device management features across its endpoint device

65%SMBs see shadow IT

activities as threats to data security.1

50%of SMBs delayed a

Cloud implementation due to lack of

cybersecurity skills.1

84%of SMBs find datasecurity to be the

biggest concern related to Cloud computing.2

CLOUD BURST

Powered by Intel®.Intel Inside®. Powerful Productivity Outside.

Brand-Specific Trademark Acknowledge LineIntel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

© 2018 Lenovo. All rights reserved. These products are available while supplies last. Prices shown are subject to change without notice. For any questions concerning price, please contact your Lenovo Account Executive. Lenovo is not responsible for photographic or typographic errors. Warranty: For a copy of applicable warranties, write to: Warranty Information, 500 Park O_ces Drive, RTP, NC 27709, Attn: Dept. ZPYA/B600. Lenovo makes no representation or warranty regarding third-party products or services. Trademarks: Lenovo, the Lenovo logo, Rescue and Recovery, ThinkPad, ThinkCentre, ThinkStation, ThinkVantage, and ThinkVision are trademarks or registered trademarks of Lenovo. Microsoft, Windows, and Vista are registered trademarks of Microsoft Corporation. Intel, the Intel logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries. Other company, product, and service names may be trademarks or service marks of others.

Don't let malware flood your data

More than half of SMBs shut down within 6 months of a data breach1. Surely, you don’t want to be one of them.

So, clearly while selecting a Cloud strategy SMBs willlook at the security aspects of the solutions intently.

Lenovo offers robust built-in security and device management features across its endpoint device categories

Cloud isn’t an option anymore. It is the way forward for all businesses.The next wave of digital revolution – artificial intelligence, robotics, Internet of Things,

and Big Data analytics will be underpinned by Cloud.

How firms protect "as-a-service" environmentsthat are o�ered via Cloud deployment:

(For PC/Tablet Users)

Source: Forrester Data Global Business Technographics® Security Survey, 2017

Secure yourdata, but secure

your devices first.

Endpoint devices are a gateway to yourorganization’s data in the Cloud. With an increasein the number of mobile employees and remoteworkers, ensuring data safety has become evenmore challenging for organizations.

So, choosing endpoint devices with built-in datasecurity features and granting complete visibilityand control to IT departments is essential.

USER AUTHENTICATION: control theaccess to your data in the Cloud

Multifactor Authentication using Intel® Authenticate:enforce user identity protection for access to thecorporate domain, network, and VPN

Biometric Authentication through Windows Helloand ThinkPad Glance: o�ers uncompromised securitywith advanced facial recognition and gaze tracking

DEVICE AND DATA MANAGEMENT: enableyour IT team to control and superviseendpoint devices

Intel® Active Management Technology (Intel® AMT):prevent unsolicited access by remotely wiping thedata on the disk drive using Remote Secure Erase

Device Management using MobileIron: an industryleading EMM that provides security to endpoint devices,network, app, and Cloud

PHYSICAL DEVICE SECURITY: preventunauthorized access to your data and devices

Smart USB Protect: allow data transfer through portsonly for authorized personnel

ThinkShutter: physically secure and cover the camerafor additional privacy

DATA PROTECTION: ensure device and dataprotection at multiple stages

Lenovo Vantage: distinguishes between legitimateand malicious networks. Detects threats or attacksnear the laptop and alerts IT

Coronet: allows only trusted users, devices, networks,and Cloud services to access your data

REMOTE DIAGNOSTICS AND RECOVERY:remotely manage, repair, and updateendpoint devices

Intel® Active Management Technology (Intel® AMT):enables IT to discover, repair, and help protectnetworked devices remotely

Windows BitLocker: recover data from hard drivein case of device failure and prevent data breachby encrypting the hard drive

Encrypt databefore it moves

to the Cloud

30% 25% 23% 23%24%

32% 34% 22% 25%24%

Track movementof data to and

within the Cloud

Draft servicelevel agreements

with providers

Perform regularsecurity assessments

of providers

Get securitycertificates from

"as-a-service" providers

Limit unauthorizedaccess to data

and applications

Identifysensitivity of

data in the Cloud

Use Cloud securitygateways or Cloud

access security brokers

Use centralizedCloud workload

security management

ImplementCloud

tokenization

ThinkPad X1 Carbon

ThinkPad X280

ThinkPad X1 Yoga

ThinkCentre M910 SFF

ThinkPad T580

Source:1. https://www.onr.com/blog2. http://www.inase.org

“40% of SMBs* cite Security and Privacy as top concernswith cloud services”

– Forrester Data Global Business Technographics® Software Survey, 2017

*SMBs = 1-999 employees