Microsoft and Intel Discuss New Security Technologies Coming to Market

Sign in to queue

Description

In the ever evolving frontlines of device security new technologies come along to help ensure that we are well protected from new emerging threats. Join us in this video from Microsoft and Intel as they explain and explore new device enabled security that are coming to market to keep you safer.

  • [2:06] Why don't you talk to us about the Security landscape as you see it at Intel.  What are some of the issues that we should be focused on?
  • [3:49] You mentioned Identity.. share with us a little more about that.
  • [5:56] What is Intel doing specifically in their processors to help with this? 
  • [7:41] How are you getting this information into the hands of your customers? 
  • [12:03] So, before we wrap it up here, where should our viewers go to find more information about Intel's security solutions? 

Embed

Download

Download this episode

The Discussion

  • User profile image
    arbatgradnja

    error

  • User profile image
    Baby Bruder

    Ask Maksim Malyutin if he's going to feel safer with this 'new' technology?

    With this years patching of a seven+ year vulnerability that lied at the very heart of Intel's silicon, out of sight of the operating system, its applications and any antivirus, that was discovered in the 2010's Intel Q57 family, all the way up to this year's Kaby Lake Core... effectively a backdoor into computers all over the world... no thanks!

    again, no thanks Intel.

  • User profile image
    Vijay

    Thanks

  • User profile image
    dldelboy

    Secure authentication is all good, but what are/can Intel and Microsoft do to protect systems AFTER successful authentication?

  • User profile image
    Suzanna

    What I despise is some IT management talk. Bulls**t bingo at it's best. Security posture?? Please I know we create this language to scare the stiffs but COME ON! If you want to sell it say HEY we have this new technology that's amazing. It gives users the option to sign in how they want. Plus be transparent. The way that Baby bruder says about the vulnerability from 7 years ago based internally in ITELs silicon. Well fess up and say we had a breech and we fixed it. Do you get it? Great.

Add Your 2 Cents