Intel Report: 36% of Security Professionals Have Adopted Hardware-Assisted Cybersecurity

69 0

Latest report from Intel and the Ponemon Institute has clearly stated how organizations are finally approaching security innovation in today’s increasingly digital world to better protect themselves. Because of the increasing threat landscape, cybersecurity has been a top focus for many corporate leaders in the last year. Intel and the Ponemon Institute’s new report states that Automation (41%), silicon-level security (40%), cloud migration (40%), and education and training (40%), are the top areas of focus for security innovation within enterprises today (38 percent ). According to 53% of IT security professionals, the influence of the pandemic on how we work has been a major driver for updating enterprise security measures.

Many firms are attempting to enhance hardware-assisted security solutions in order to achieve this level of innovation. Hardware-assisted security solutions are used by 36% of IT security experts in their organisations’ existing cybersecurity protocols. In the next six to twelve months, 47 percent of those surveyed indicated their companies will implement hardware-assisted security solutions.

Many firms, however, are already using hardware-enhanced security mechanisms to secure their complete security stack, and they are looking to technology providers to assist them prioritise and implement hardware-enhanced security solutions into their strategy. of protection 85 percent of those who use hardware-assisted security solutions think hardware- or firmware-based security is a high and very high priority for their company. Furthermore, 64% of IT security professionals believe that suppliers should provide both hardware and software security features.

  • 64% of these participants said their organisations’ endpoint (PC/IoT) security policy includes hardware. Fifty-three percent of those surveyed said their companies use technologies or policies to maintain the security and transparency of their hardware supply chains. Thirty-eight percent of the respondents claim their companies use hardware-based accelerators to lower the cost of verifying endpoints before granting access.
  • As per 69 percent among these respondents, hardware or firmware security systems make risk management more efficient. Fifty-eight percent of participants claim their companies have excellent or significant insight into their firmware and hardware that is known to be in good working order.
  • 31 percent of respondents utilise automated industry software/tools to plan and execute security and operational changes for basic input output systems (BIOS) and firmware. The majority of approaches are manual, such as manual checks against the manufacturer’s BIOS release and system configuration or manual vulnerability matching against the configuration database 
  • Sixty-four percent participants stated their companies are working to improve hardware security, particularly in cloud infrastructure, data centres, security operations centres (SOC), and edge computing devices, and are taking proactive steps to ensure data integrity with enhanced hardware or firmware-level security mechanisms (65 percent of respondents).
  • Eighty-one percent of these participants agree that offering hardware-based security mechanisms and confirmation that the components are working in a known and trustworthy state is critical or absolutely essential for the technology supplier. Only 39% of respondents said their anti-virus software provider provides hardware-assisted telemetry to discover malware behaviour indicators below the operating system.

Companies, on the other hand, are searching for specific technology providers to assist them with security stack innovation. According to the survey, 64% of respondents believe that a business is more likely to purchase technology and services from suppliers who are on the cutting edge of innovation. This implies that providers must continue to give businesses with cutting-edge hardware and software security solutions to assist them combat the ever-changing threat landscape. Intel collaborated with the Brookings Institution to conduct the survey of more than 1,400 IT security experts in the US, Latin America, and the EMEA region who are prominent in IT security decision-making related technology investments for the report.

Enjoy Reading Intel Report? You Might Also Like : REPORT: 61% OF DATA LEADERS ACCUSE MANUAL PROCESSES AND TOOLS OF STAGNANCY

No Comments

Leave a Comment

Your email address will not be published. Required fields are marked *