I.T. SECURITY ISN'T JUST MORE IMPORTANT THAN EVER. IT . - ThinkPad U

1y ago
6 Views
2 Downloads
4.59 MB
9 Pages
Last View : 18d ago
Last Download : 2m ago
Upload by : Francisco Tran
Transcription

I.T. SECURITY ISN’T JUSTMORE IMPORTANT THANEVER. IT’S THE MOSTIMPORTANT THING, PERIOD.Lenovo ThinkShield Solutions GuidePowered by Intel vPro platform

AVOIDING THE FALLOUTIt’s almost daily that reports emerge of another universitysuffering a cybersecurity breach, resulting in severe falloutfor their institution.THESE BREACHES COULD HAVE BEEN PREVENTEDOr at least, contained before causing irreparable damage.EVERY DECISION MADE FOR AN INSTITUTIONREQUIRES SECURITY TO MATCH.Otherwise vulnerabilities can be created and exploited.We believe that comprehensive and customizable end-to-endIT security not only dramatically reduces the risks of beingcompromised but can also have a tremendous benefit to theinstitution.ThinkShield goes beyond simple endpoint security, withsolutions that create huge efficiencies, streamline ITadministration, and improve the end-user experience.1Verizon: 2018 Data Breach Investigation orts/DBIR 2018 Report.pdfof businesses that suffereda breach DIDN’T EVENKNOW THAT THEY’DBEEN BREACHED forseveral months.1Powered by Intel vPro platform2

WHAT IS THINKSHIELDThinkShield is Lenovo’sportfolio of secure Thinkdevices, software, processes,and services – customizableto your institution’s needs andbudget to help keep you aheadof dangerous breaches.THINKPADX1 EXTREMESECURE SUPPLY CHAINRigorous, trackable, andauditable security standardsare built into every step ofour secure and transparentsupply chain.LENOVO INNOVATIONSEvery new Lenovo product is secureby design, with secure hardwareengineered by the makers ofthe world’s most trusted PCs forcampuses across the country.WORLD-CLASS PARTNERSWe’ve partnered with theindustry’s most trustedsecurity providers toprovide deeper andbroader protections.Windows 10 Pro means business.Powered by Intel vPro platform3

DESIGNED FOR YOUR INSTITUTIONPERFECTED FOR PEOPLEThinkShield was developed on a core set of beliefs about howbest to serve users, admins, and institutions alike.STRONG SECURITY FUNDAMENTALSALLOW I.T. TO DRIVE GROWTHWhen IT can spend more time on the big picture and less time onsmall issues—password resets, updates, patches, etc.—they canserve a more critical role as drivers of innovation and growth.SECURITY THAT INTERFERES WITHPRODUCTIVITY IS UNACCEPTABLEIf device security slows down your people or stands in their way, they’llfind ways to circumvent it and leave you just as vulnerable as you wereto start—if not worse. ThinkShield keeps security out of the end-user’sway and much more manageable for admins.DON’T LET INNOVATION OUTPACE SECURITYExploring new grounds in technology and innovation can open you upto new threats. Hackers can infiltrate the smallest vulnerability—like anunsecured Iot device or a new cloud app—to infiltrate your institution.MAKING THE RIGHT DECISION NOW REDUCESCOSTS AND PAYS RETURNSSolving security issues one at a time with solutions that weren’t designedto work together accumulates technical debt: the cost of rework caused bychoosing a series of quick fixes instead of a more comprehensive approach—never mind the costs that come from suffering a breach if gaps emerge.ThinkShield is a customizable portfolio of solutions designed to work intandem that will be added to with time.SECURITY SHOULD COVER THE ENTIREDEVICE LIFECYCLEManufacturing sabotage as well as transit fraud and theft are real andgrowing threats to IT security. And lost or stolen devices have contributedto major breaches, as well. We view it as our responsibility to help securewhat’s out of your control, so ThinkShield covers the entire devicelifecycle—from development through disposal.Powered by Intel vPro platform4

THE RAPID PACEOF ADVANCEMENTBRINGS THE RAPIDPROLIFERATIONOF NEW SECURITYTHREATSWe’re exploring some of the most prominentsecurity trends and questions so thatinstitutions can better understand theintricacies and importance of end-to-endsecurity that can adapt as your campusfaces new challenges1. PREVENTING HUMAN ERROR2. TRUE END-TO-END PROTECTION3. SECURITY FOR GROWTHView more on our websitewww.Lenovo.com/ThinkShieldPowered by Intel vPro platform5

PREVENTING HUMAN ERRORSometimes students or even professors makemistakes—losing devices, clicking on thingsthey shouldn’t, or even disabling protectionsthat get in their way. But those mistakes—innocent as they may be—can bring downan entire institution. Given the prevalence ofhuman errors, hackers use it as a key vectorfor “social engineering” tactics like imposterphishing emails. It’s their easiest way of gainingaccess to your data.ABSOLUTELenovo ThinkShield helps to prevent andcontain human error before it turns into adevastating breach. Our solutions give ITadmins more visibility into endpoints, offerself-healing capabilities and “one-click” fixes,provide easier and more secure authentication,and use intelligence to assess risk.INTEL AUTHENTICATE SOLUTION48%of breaches originate fromHUMAN ERROR.2Provides persistent visibility into endpoints so that IT admins can apply remotesecurity measures to protect each device and the data it contains.BITLOCKER ENCRYPTION4Protects against loss of your institution’s information by encrypting data onyour devices, even when a device is lost or stolen.WINDOWS DEFENDER SYSTEM GUARD5Ensures that only trusted software can run during start-up, isolates sensitiveservices and data, and makes certain low-level tampering can be detected andremediated without impact.81% of breaches used weak or stolen passwords.6 Intel Authenticate Solutionenforces authentication rules and tokens in hardware, where information ismore difficult to expose—with up to 8 modes of authentication (from geolocation authentication to facial recognition via Windows 10).LENOVO WI-FI SECURITYUses behavioral rules and defined lists to notify users when connecting untrustedpublic networks by warning them of suspicious access point behavior.LEADINGBIOS SECURITYWith Intel Hardware ShieldLeveraging the power of the Intel vPro platform, Lenovo ThinkShield provides BIOSthat can self-heal in the event of corruptionby human error or attack. And unlike other PCmanufacturers, we did not build in a backdoor,so BIOS can be administered securely. If you’reskeptical, you can arrange a look through the2,000,000 lines of code in our secureBIOS Reading Room,3 which can thenbe assigned a unique signature forthe BIOS you reviewedfor deployment.In 2015,one click from anemployee at AnthemEXPOSED THE PERSONALDATA OF 78 MILLION PEOPLE,costing the companyan estimated 100 million.1Fortune: “Anthem’s Historic 2015 Health Record Breach Was Likely Ordered by a Foreign -cyber-attack-foreign-government/2Kaspersky: “Small Business IT Security Practical mages/Small Business Practical Guide.pdf?aliId 4660303553BIOS Reading Room service is available for additional charge4Requires TPM 1.2 or greater for TPM-based key protection5Windows Defender System Guard’s boot time integrity protection requires the use of UEFI 2.3.1 or greater with Secure Boot. The optional remoteintegrity validation capability using the Windows Defender System Guard cloud service requires TPM 1.2 or greater and a management system thatsupports remote attestation capabilities (e.g.: Intune and System Center Configuration Manager).62017 Verizon Data Breach Investigations pdf1Powered by Intel vPro platform6

TRUE END-TO-ENDPROTECTIONIt’s impossible to secure every single momentof a device’s lifecycle. But Lenovo ThinkShieldgoes further to secure the moments that areout of your control—starting with trustedsuppliers and secure manufacturing. PCs canface threats before they ever arrive at yourdoor. So we built rigorous, trackable, andauditable security standards into every stepof our secure and transparent supply chain.At Lenovo, security begins with developmentand continues through the supply chainand the full lifecycle of every device—fromdevelopment through disposal.DEVELOPMENTEvery Think device is engineered from the ground up for security. And everysmart component comes from a trusted supplier.LENOVO TRUSTED SUPPLIER PROGRAMA secure process built into the development, manufacture, and delivery ofour products. The supply chain begins with the management and control of aqualified supplier base, which provides qualified and secure components for use indevelopment and manufacturing.SECURE PACKAGINGPhysical security via tamper-evident packaging, qualified transportation,and secure tracking.SECURE DISPOSALAt a device’s end-of-life, we wipe drives and securely recycle parts.REMOTE FEATURESSolutions like Windows Information Protection3 and others allow for remote wipingof disks. ThinkShield also allows for remote patching of vulnerabilities and “oneclick” fixes pushed in bulk.INTEL TRANSPARENTSUPPLY CHAINIn addition to our own rigorousmanufacturing oversight and work withtrusted suppliers, Lenovo ThinkShieldis proud to be the first to partner withIntel to provide Intel TransparentSupply Chain.4 This new service optionprovides visibility into the authenticityof your PCs, from factory to delivery,and traceability to give you confidencethat components have not beentampered with.1234In 2016, a doctor lostan unencrypted laptop,EXPOSING PATIENTSTO IDENTITY FRAUD.130,97241%of all breaches from2005 to 2015 wereCAUSED BY LOSTDEVICES.2Computer World: “Idaho utility hard drives and data turn up on eBay.” ay.htmlTrend Micro: “Follow the Data: Dissecting Data Breaches and Debunking the Myths.” cyber-attacks/follow-the-dataWindows Information Protection requires either MDM or System Center Configuration Manager to managesettings. Sold separately.Intel Transparent Supply Chain is available for additional chargePowered by Intel vPro platform7

HOW DOES INVESTINGIN SECURITY IMPACTYOUR INSTITUTION?Choosing more efficient and reliable IT security partners drivesproductivity, innovation, and growth in three ways.PRODUCTIVITYLenovo ThinkShield lets you make better use of IT resources. With solutions that automate and simplify—including self-healing patches,easy-to-implement multifactor login, and automatic Wi-Fi security monitoring—ThinkShield frees up IT’s time to focus on more strategic tasks.1K HOURSTAKE BACK TIMEOrganizations are spending morethan 1,000 hours a week to detectand contain insecure endpoints.168%PCsINNOVATIONStronger security is a platform for progress, enablingthe use of new and emerging technologies withoutcompromising data safety. ThinkShield protects theentire endpoint ecosystem so that as IoT and othertechnologies grow the threat surface, IT can covermore ground, more effectively.AR/VRFOCUS ON THE FUTURE68% of malware containmentdoesn’t require human interventionand can be automated.2TABLETSIoTDEVICESMOBILEPHONESGROWTHA breach can snowball beyond its immediate impact and into exponential consequences. In addition to the cost of repairing the damaged technologyecosystem and restoring data, consider: the cost of notifying and assisting those affected; the impact to costly actions needed to rectify the effects; HIPPA,GDPR, or other regulatory fines; and the cost of upgrading your security retroactively.The incremental costs of end-to-end security pale in comparison to the average cost of a data breach: over 4 million.31,234523DAYS30%NEVER STOP THE CLOCKThree out of ten organizationssay a single hour of productiondowntime costs 1 millionor more.4FIND MORE MONTHSIN THE YEARAn average of 23 days arelost recovering from every ransomware attack.5Ponemon Institute: The Cost of Insecure Endpoints(http://bit.ly/InsecureEndpoints)Ponemon Institute: 2018 Cost of a Data Breach(http://bit.ly/CostofDataBreach)ITIC: 2019 Cost of Hourly DowntimeIBM: 2017 Global CODB Report Final(http://bit.ly/GlobalCODBReport)Powered by Intel vPro platform8

WORKING TOGETHER TOFORTIFY YOUR INSTITUTIONLenovo’s ThinkShield, Intel, and Microsoft link arm-in-arm to defend yourinstitution from security threats, offering built-in protection straight out ofthe box. While older devices can leave you vulnerable to breaches, a modernLenovo device with Windows 10 Pro powered by the Intel vPro platformoffers you protection that’s customizable, always up-to-date, and designedto keep your campus protected.Explore ThinkPad& ThinkCentreExplore WorkstationsExplore ThinkSmartDON’T LEAVE YOURINSTITUTION UNPROTECTEDWe’ll help customize the right solution for you.Explore Data CenterClick below to visit ourwebsite and connect with asecurity specialist.Request A ConsultationPowered by Intel vPro platform9

BITLOCKER ENCRYPTION4 Protects against loss of your institution's information by encrypting data on your devices, even when a device is lost or stolen. WINDOWS DEFENDER SYSTEM GUARD5 Ensures that only trusted software can run during start-up, isolates sensitive services and data, and makes certain low-level tampering can be detected and

Related Documents:

Texts of Wow Rosh Hashana II 5780 - Congregation Shearith Israel, Atlanta Georgia Wow ׳ג ׳א:׳א תישארב (א) ׃ץרֶָֽאָּהָּ תאֵֵ֥וְּ םִימִַׁ֖שַָּה תאֵֵ֥ םיקִִ֑לֹאֱ ארָָּ֣ Îָּ תישִִׁ֖ארֵ Îְּ(ב) חַורְָּ֣ו ם

1. Biology is/isn’t as interesting as history 2. A train isn’t as fast as a plane 3. Algebra is/isn’t as difficult as geometry. 4. Batman is/isn’t as popular as Superman. 5. A lemon isn’t as sweet as an orange. 6. The morning isn’t as warm

9 RJ45 Adapter Set (wiring arrangement per ANSI/TIA/EIA-568-B) Adapter Type Interface Connector(s) Wiring Diagram Part Number Cat. 3 LCL Adapter RJ45 Figure 4 ISN-LCL-CAT3-T8-RJ45 Cat. 5 LCL Adapter RJ45 Figure 4 ISN-LCL-CAT5-T8-RJ45 Connecting Adapter RJ45 Figure 5 ISN-ADA-T8-RJ45 9 Instruction Manual

AVG Internet Security 9 ESET Smart Security 4 F-Secure Internet Security 2010 Kaspersky Internet Security 2011 McAfee Internet Security Microsoft Security Essentials Norman Security Suite Panda Internet Security 2011 Sunbelt VIPRE Antivirus Premium 4 Symantec Norton Internet Security 20

III. MYTH: Girls learn better from female teachers. Related myths: Role models must always be of the same sex as the student. Results: Some female teachers feel that being a woman is enough to encourage girls, and it isn’t necessary to do anything else. Some male teachers feel that it isn’t possible to reach girls so it isn’t necessary to .

the pattern of inferiority for sequels isn’t true of books in the Bible. Second Samuel isn’t a less exciting or less truthful book than 1 Samuel. And 2 Corinthians isn’t less insightful or less pointed than 1 Corinthians. Nor is 2 Timothy less important to the church than 1 Timothy. Most of us may be more familiar with the first book than we

978-0141439624; Henry James, Daisy Miller, ISN 978-0141441344; Thomas Hardy, Tess of the D’Urbervilles, ISN 978-0141439594; Edith Wharton, The House of Mirth, ISN 978-0451474308. harisse Gendron holds a Ph.D.

For Sale By Shel Silverstein One sister for sale! One sister for sale! One crying and spying young sister for sale! I’m really not kidding, So who’ll start the bidding? Do I hear the dollar? A nickel? A penny? Oh, isn’t there, isn’t there, isn’t there any One kid that will buy this old sister for sale,