Hardware-assisted security will soon gain momentum – study • The Register


an intel study finds that businesses are hungry for cybersecurity and want to see how security can be built into devices.

Hardware-Assisted Security (HAS) uses hardware extensions and components to support security at higher-level machine layers, from BIOS to desktop applications.

In practice, HAS can accelerate security-related processing, protect memory boundaries, secure random number generation, isolate application execution, and enable trusted computing through hardware components such as platform modules. form of trust (TPM).

Intel says security approaches like this are increasingly relevant as threats emerge faster and more businesses and information around the world migrate from physical to digital.

The study found that 64% of 1,406 IT managers surveyed by Intel were more likely to buy security solutions from vendors they consider “state-of-the-art”, which is not surprising. given another finding: 71% said technology vendors “need to be able to adapt. This includes offering elements of HAS such as TPMs and an open ecosystem,” said two-thirds of respondents.

It’s for nothing if you don’t have visibility

Intel insists that all security solutions in the world are useless without network visibility. Without knowing which systems are where and what they are doing, they can remain hidden on networks while harboring critical vulnerabilities.

“Less than half of organizations (48%) have visibility into vulnerabilities and recently disclosed patches/updates, and primarily prioritize security updates for the latest generation of products (42% of respondents) while there are still many legacy devices in use around the world,” Intel said.

Hardware and firmware security solutions make it easier to manage vulnerabilities, said 69% of respondents. Of these, 58% said they had “good or significant visibility into the operation of their hardware and firmware in a known good condition.”

For these respondents, 48% said their security teams spend an average of 17 hours per week mapping known vulnerabilities in IoT devices.

So what are leading hardware-enhanced security organizations doing differently?

Intel’s findings suggest it all depends on how the mindset behind HAS forces organizations to change. Of those who said they use hardware-assisted security, 85% said it was a top priority and 64% said their organizations were taking steps to advance security at the hardware level.

A third party automates their BIOS and firmware updates, and a number have also integrated zero-trust policies with hardware-assisted security solutions. ®


About Author

Comments are closed.