The Results Could be Game Changing
Software companies and device manufacturers can leverage Intel® Threat Detection Technology’s (TDT) security-level telemetry to play an active role against “above the OS'' attacks such as ransomware and cryptomining.
- Adoption of Intel TDT could lead to a measurable difference in security efficacy between Intel-based systems and the systems based on other processor vendors.
- Intel's Accelerated Memory Scanning feature dropped CPU utilization from 20% to as little as 2% for memory scanning use cases.
- The selection and procurement of PC’s and server systems have a long-term, measurable impact on the security posture of an organization.
Get the Paper
IDC discusses how Intel is unlocking capabilities in its system on a chip (SoC) that fundamentally change the ability of security vendors to implement security.
Discover the IDC’s Key Findings
- The goal of the Intel Security vendor partnership is to enable and empower the Intel-based systems of today and tomorrow to be fundamentally more secure and have lower malware infection rates than AMD, Apple and other ARM-based processor systems.
- Intel TDT has different capabilities, and most are backward-compatible to sixth-generation Skylake processors. The Tiger Lake generation adds new multidetector capabilities and performance increases.
- Adoption could lead to a measurable difference is security efficacy between Intel-based systems and the systems based on other processor vendors.
“The features provided by Intel enable a demonstrable improvement to security.”
“PMU (Performance Monitoring Unit) for detection...does not have the same potential impact of leveraging graphics processing units (GPUs) in Intel processors. Applying GPUs to security use cases can be game changing, in IDC's opinion.”
“The ‘handcuffs’ can be removed from security providers as to the complexity of detection algorithms used. Models that were too complex and violated the upper limit of the 2% cap can now be leveraged.”