Download - Cloud and PCs Static Infographic 040418 › content › dam › insight-web › ... · Lenovo offers robust built-in security and device management features across its endpoint device

Transcript
Page 1: Cloud and PCs Static Infographic 040418 › content › dam › insight-web › ... · Lenovo offers robust built-in security and device management features across its endpoint device

65%SMBs see shadow IT

activities as threats to data security.1

50%of SMBs delayed a

Cloud implementation due to lack of

cybersecurity skills.1

84%of SMBs find datasecurity to be the

biggest concern related to Cloud computing.2

CLOUD BURST

Powered by Intel®.Intel Inside®. Powerful Productivity Outside.

Brand-Specific Trademark Acknowledge LineIntel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.

© 2018 Lenovo. All rights reserved. These products are available while supplies last. Prices shown are subject to change without notice. For any questions concerning price, please contact your Lenovo Account Executive. Lenovo is not responsible for photographic or typographic errors. Warranty: For a copy of applicable warranties, write to: Warranty Information, 500 Park O_ces Drive, RTP, NC 27709, Attn: Dept. ZPYA/B600. Lenovo makes no representation or warranty regarding third-party products or services. Trademarks: Lenovo, the Lenovo logo, Rescue and Recovery, ThinkPad, ThinkCentre, ThinkStation, ThinkVantage, and ThinkVision are trademarks or registered trademarks of Lenovo. Microsoft, Windows, and Vista are registered trademarks of Microsoft Corporation. Intel, the Intel logo, Intel Inside, Intel Core, and Core Inside are trademarks of Intel Corporation in the U.S. and/or other countries. Other company, product, and service names may be trademarks or service marks of others.

Don't let malware flood your data

More than half of SMBs shut down within 6 months of a data breach1. Surely, you don’t want to be one of them.

So, clearly while selecting a Cloud strategy SMBs willlook at the security aspects of the solutions intently.

Lenovo offers robust built-in security and device management features across its endpoint device categories

Cloud isn’t an option anymore. It is the way forward for all businesses.The next wave of digital revolution – artificial intelligence, robotics, Internet of Things,

and Big Data analytics will be underpinned by Cloud.

How firms protect "as-a-service" environmentsthat are o�ered via Cloud deployment:

(For PC/Tablet Users)

Source: Forrester Data Global Business Technographics® Security Survey, 2017

Secure yourdata, but secure

your devices first.

Endpoint devices are a gateway to yourorganization’s data in the Cloud. With an increasein the number of mobile employees and remoteworkers, ensuring data safety has become evenmore challenging for organizations.

So, choosing endpoint devices with built-in datasecurity features and granting complete visibilityand control to IT departments is essential.

USER AUTHENTICATION: control theaccess to your data in the Cloud

Multifactor Authentication using Intel® Authenticate:enforce user identity protection for access to thecorporate domain, network, and VPN

Biometric Authentication through Windows Helloand ThinkPad Glance: o�ers uncompromised securitywith advanced facial recognition and gaze tracking

DEVICE AND DATA MANAGEMENT: enableyour IT team to control and superviseendpoint devices

Intel® Active Management Technology (Intel® AMT):prevent unsolicited access by remotely wiping thedata on the disk drive using Remote Secure Erase

Device Management using MobileIron: an industryleading EMM that provides security to endpoint devices,network, app, and Cloud

PHYSICAL DEVICE SECURITY: preventunauthorized access to your data and devices

Smart USB Protect: allow data transfer through portsonly for authorized personnel

ThinkShutter: physically secure and cover the camerafor additional privacy

DATA PROTECTION: ensure device and dataprotection at multiple stages

Lenovo Vantage: distinguishes between legitimateand malicious networks. Detects threats or attacksnear the laptop and alerts IT

Coronet: allows only trusted users, devices, networks,and Cloud services to access your data

REMOTE DIAGNOSTICS AND RECOVERY:remotely manage, repair, and updateendpoint devices

Intel® Active Management Technology (Intel® AMT):enables IT to discover, repair, and help protectnetworked devices remotely

Windows BitLocker: recover data from hard drivein case of device failure and prevent data breachby encrypting the hard drive

Encrypt databefore it moves

to the Cloud

30% 25% 23% 23%24%

32% 34% 22% 25%24%

Track movementof data to and

within the Cloud

Draft servicelevel agreements

with providers

Perform regularsecurity assessments

of providers

Get securitycertificates from

"as-a-service" providers

Limit unauthorizedaccess to data

and applications

Identifysensitivity of

data in the Cloud

Use Cloud securitygateways or Cloud

access security brokers

Use centralizedCloud workload

security management

ImplementCloud

tokenization

ThinkPad X1 Carbon

ThinkPad X280

ThinkPad X1 Yoga

ThinkCentre M910 SFF

ThinkPad T580

Source:1. https://www.onr.com/blog2. http://www.inase.org

“40% of SMBs* cite Security and Privacy as top concernswith cloud services”

– Forrester Data Global Business Technographics® Software Survey, 2017

*SMBs = 1-999 employees