Inside Intel, part 1: Evolution of IT security
How Intel works to stay on top of the security requirements of cloud, mobile, and other fast-growing trends
By Bob Violino
October 16, 2012 — CSO —
Like many other companies, processor manufacturer Intel Corp. is having to evolve its information security focus to meet the changes underway in the technology landscape—particularly with the rapid growth of mobile devices and applications and the rise in cloud computing services.
"We realize the importance of detective controls and building out our security business intelligence capabilities to scale and meet future business objectives around computing," says Alan Ross, senior principal engineer at Intel.
"We must have the ability to aggregate, correlate and even visualize many billions of events per day. This type of scale requires investment in many areas."
One particular area of focus for the company is mobility, Ross says. "In order to deliver the appropriate user experience for mobility, we need capabilities such as single sign-on and federation that will enable seamless access to applications and information without compromising the security of the information," he says.
Cloud computing brings a lot of opportunity, Ross says, "but with it come some security concerns that must be addressed in order to balance the capabilities with the risk. We continue to focus on application and data security as well as the ability to have near real-time visibility into what's occurring within these internal and external computing environments."
Much of the effort with cloud security will involve the use of security business intelligence (BI), Ross says. Among the other security technologies that will continue to play a key role in IT security are identity and access management, and Ross says initiatives in this area are growing at a rapid rate.
"We have principals—users, customers, workers, suppliers—who need access to our applications and systems," Ross says. "As we scale out our security capabilities to comprehend devices, applications and data, we will need to scale our identity and access management capabilities accordingly while investigating new capabilities around authentication, federation, single sign-on, policy decisions and access management."
That's something Intel has been working on for the past couple of years, Ross says, and will continue to focus on in the future.
As technology continues to evolve, companies' information will be at risk from security threats, Ross says. "We need to make unique usage models and combinations of technologies such as enterprise rights management [and] data loss prevention (DLP), along with having the ability to secure information and data across the entire lifecycle," he says.
"We also need to be able to automatically tag and classify information so it can be appropriately protected."