Thursday, February 18, 2010

Intel Corporation -PC chipset stores

Intel AMT enhances the security and central remote management of business PCs by providing a firmware-based out-of band communication channel through which a management console can reach the PC even when it is powered off or the operating system (OS) is non-functional or missing. A management engine within the PC chipset stores authentication information in non-volatile memory that it uses to pass information across the same physical network interface used by the host OS, but with its own logical identity and IP address.


This mechanism allows system administrators to dramatically extend their management reach, including the ability to remotely discover hardware and software, power machines up and down, and deploy security patches and other software, regardless of system state. Using Intel AMT, support organizations can also isolate PCs from the rest of the network if they become compromised by malware.


Industry Challenges that Inspired Intel Trusted Execution Technology

Where the traditional focus of network protection has been. Coupled with the fact that a compromised PC may offer the means to obtain access to servers and other network assets, these characteristics have created an incentive for hackers to focus their efforts on client computing platforms.


Attack tools are widely available on the Internet, and IT organizations too often find themselves in a reactive mode in trying to fend off malicious intruders. The diversity and flexibility of intrusion attempts has largely outpaced the ability of today's protection models to cope with them.


As vulnerabilities in popular operating systems and application software are publicized, exploits are generated, often before security patches can be created to guard against them.


Financial incentives associated with the theft of data will continue to grow and encourage attempts to breach system defenses. Because of the increasing significance of the business PC in overall security, it has become necessary for IT organizations to look beyond perimeter defenses in protecting their networks.

No comments: