Businesses look to hardware-assisted security to improve their protection

Companies are very focused on improving your cybersecuritya field in which it is expected that invest 172,000 million dollars in 2022. In addition, according to a study carried out by the Ponemon Institute for Intel, they are open to testing with the hardware assisted security (HAS). This type of security uses extensions and hardware components to support the security of the highest level system layers, from the BIOS to desktop applications.

Thus, hardware-assisted security can speed up security-related processes, protect memory limits, ensure random number generation, isolate app execution, and enable trusted computing through hardware components. Among them, the trusted platform modules (TPMs). And Intel says security approaches like this are becoming more relevant as new threats appear faster, while data and businesses around the world move from the physical to the digital world faster.

The study, based on a survey of 1,406 IT leaders from around the world, revealed that 64% of them were more inclined to buy security solutions from providers that they considered to be the latest generation, and 71% assured that technology providers «they need to be able to adapt to the changing threat landscape«. For 66% of those surveyed, this implies offering hardware-assisted security elements, such as TPMs, and an open ecosystem.

For Intel, no security solution works without network visibility. Without knowing what systems there are, and where they are and what they do, they can be hidden in a network and have critical vulnerabilities, something to avoid. Only 48% of organizations have visibility into recently discovered vulnerabilities, and their corresponding patches and updates. 42% prioritize security updates for the latest generation of products, when they still have many older devices and systems in use.

69% of those who responded to the survey indicated that hardware and firmware security solutions make it easy to manage vulnerabilities. Of these, 58% stated that they had good or notable visibility into whether their hardware and firmware are working in good condition, and they are aware of it. In addition, 48% said their security teams spend an average of 17 hours a week mapping known Internet of Things device vulnerabilities.

Regarding the leading companies in hardware-assisted security, Intel points out that they make the difference with respect to the others in the approach in relation to HAS, which makes companies change. Among executives who said they use HAS in their companies, 85% say hardware-assisted security is among their top priorities, and 64% say their companies are taking steps toward advancing hardware-assisted security .

Approximately 33% automate their BIOS and firmware updates, and quite a few have also integrated zero trust strategies with hardware-assisted security solutions. 36% have already adopted hardware-assisted security solutions, and 47% say their companies will adopt them in the next twelve months. Of these, 24% will do so within six months, and 23% within a maximum period of one year.

Related Articles

Leave a Reply

Your email address will not be published.