{"id":18141,"date":"2023-05-08T13:27:24","date_gmt":"2023-05-08T11:27:24","guid":{"rendered":"https:\/\/silicon-saxony.de\/intel-transparency-and-security-assurance-drive-preference\/"},"modified":"2023-06-15T11:01:07","modified_gmt":"2023-06-15T09:01:07","slug":"intel-transparency-and-security-assurance-drive-preference","status":"publish","type":"post","link":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/","title":{"rendered":"Intel: Transparency and Security Assurance Drive Preference"},"content":{"rendered":"<p><strong>Today, Intel released the results of a study examining how transparency, security innovation and ongoing security assurance impact purchase decisions. Key findings indicated a preference for technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk. Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their security posture and truly unleash the power of data.<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" height=\"150\" width=\"300\" src=\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg\" data-htmlarea-file-uid=\"4556\" style=\"\" alt=\"\"><\/p>\n<p>&quot;Security doesn\u2019t just happen. If you are not finding vulnerabilities, then you are not looking hard enough,&quot; said Suzy Greenberg, vice president, Intel Product Assurance and Security. &quot;Intel takes a transparent approach to security assurance to empower customers and deliver product innovations that build defenses at the foundation, protect workloads and improve software resilience. This intersection between innovation and security is what builds trust with our customers and partners.&quot;<\/p>\n<p><em><strong>Study Highlights<\/strong><\/em><br \/>Ponemon Institute independently conducted a survey of 1,875 individuals in the United States; the United Kingdom; Europe, the Middle East and Africa; and Latin America who are involved in overseeing the security of their organizations\u2019 information technology (IT) infrastructure. In addition, respondents are familiar with their organizations\u2019 purchases of IT security technologies and services.<\/p>\n<p>Key findings from the study, sponsored by Intel, include:<\/p>\n<ul>\n<li>Seventy-three percent of respondents say their organization is more likely to purchase technologies and services from technology providers that are proactive about finding, mitigating and communicating security vulnerabilities. Forty-eight percent say their technology providers don\u2019t offer this capability.<\/li>\n<li>Seventy-six percent of respondents say it is highly important that their technology provider offer hardware-assisted capabilities to mitigate software exploits.<\/li>\n<li>Sixty-four percent of respondents say it is highly important for their technology provider to be transparent about available security updates and mitigations. Forty-seven percent say their technology provider doesn\u2019t provide this transparency.<\/li>\n<li>Seventy-four percent of respondents say it is highly important for their technology provider to apply ethical hacking practices to proactively identify and address vulnerabilities in its own products.<\/li>\n<li>Seventy-one percent of respondents say it is highly important for technology providers to offer ongoing security assurance and evidence that the components are operating in a known and trusted state.<\/li>\n<\/ul>\n<p><em><strong>Vendor Characteristics<\/strong><\/em><br \/>The key findings indicate that specific vendor characteristics affect purchase decisions. In some cases, there is a significant gap between the importance of these characteristics and the ability of the provider to have the capability. Characteristics include:<\/p>\n<ul>\n<li>Transparency about security updates and available mitigations.<\/li>\n<li>Vendor\u2019s ability to identify vulnerabilities in its own products and mitigate them.<\/li>\n<li>Ongoing security assurance and evidence that the components are operating in a known and trusted state.<\/li>\n<li>Hardware-assisted capabilities to help protect distributed workloads and data in use, and to defend against software exploits.<\/li>\n<\/ul>\n<p>Developing the strongest products requires power, performance and security. Security capabilities rooted in hardware not only provide security assurance against current threats, but also improve software reliability and provide additional layers of protection at the foundation and across workloads to protect against future threats.<\/p>\n<p>Intel\u2019s approach is driven by extensive research and continuous integration of key learnings throughout the development processes and practices. As a result, Intel products are designed to deliver security assurance and advance security capabilities.<br \/>\n<em><strong>Links<\/strong><\/em><\/p>\n<link http:\/\/www.intel.com=\"\" -=\"\" arrow-right=\"\">www.intel.com <link https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2021\/03\/2021-intel-poneman-study.pdf=\"\" -=\"\" \"external-link-new-window=\"\" arrow-right\"=\"\" \"opens=\"\" internal=\"\" link=\"\" in=\"\" current=\"\" window\"=\"\">To the full report<br \/>\n<em>Image: Intel<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, Intel released the results of a study examining how transparency, security innovation and ongoing security assurance impact purchase decisions. Key findings indicated a preference for technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk. Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their security posture and truly unleash the power of data.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[4764],"tags":[1937,1936,1939,1981,1940,1942,1944,4826,4833,1946,1952,1962,1964,1965,1967,2010,1969,1972,4827,2004,2012,1979,4835,1984,1960,1986,4825,1970,1977,1956],"class_list":["post-18141","post","type-post","status-publish","format-standard","hentry","category-software-en","tag-automation-en","tag-big-data-en","tag-blockchain-en","tag-cleanroom","tag-cloud-en","tag-data-security","tag-digital-twins","tag-digitization-en","tag-ecology-energy-transition-en","tag-edge-computing-en","tag-electronics","tag-ic-design-en","tag-industrial-internet-of-things-en","tag-it-en","tag-machinery-plant-engineering","tag-manufacturing","tag-mixed-reality-en","tag-nanoelectronics","tag-neuromorphic-computing-en","tag-packaging-en","tag-process-technologies","tag-quantum-computing","tag-research-development-en","tag-robotics","tag-semiconductor","tag-sensors","tag-software-development-en","tag-sustainability","tag-track-trace","tag-wireless-systems"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intel: Transparency and Security Assurance Drive Preference - Silicon Saxony<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intel: Transparency and Security Assurance Drive Preference - Silicon Saxony\" \/>\n<meta property=\"og:description\" content=\"Today, Intel released the results of a study examining how transparency, security innovation and ongoing security assurance impact purchase decisions. Key findings indicated a preference for technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk. Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their security posture and truly unleash the power of data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\" \/>\n<meta property=\"og:site_name\" content=\"Silicon Saxony\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T11:27:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-15T09:01:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg\" \/>\n<meta name=\"author\" content=\"publizer2silisax\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"publizer2silisax\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\"},\"author\":{\"name\":\"publizer2silisax\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\"},\"headline\":\"Intel: Transparency and Security Assurance Drive Preference\",\"datePublished\":\"2023-05-08T11:27:24+00:00\",\"dateModified\":\"2023-06-15T09:01:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\"},\"wordCount\":551,\"image\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg\",\"keywords\":[\"Automation\",\"Big Data\",\"Blockchain\",\"Cleanroom\",\"Cloud\",\"Data Security\",\"Digital Twins\",\"Digitization\",\"Ecology &amp; Energy Transition\",\"Edge Computing\",\"Electronics\",\"IC Design\",\"Industrial Internet of Things\",\"IT\",\"Machinery &amp; Plant Engineering\",\"Manufacturing\",\"Mixed Reality\",\"Nanoelectronics\",\"Neuromorphic Computing\",\"Packaging\",\"Process Technologies\",\"Quantum Computing\",\"Research &amp; Development\",\"Robotics\",\"Semiconductor\",\"Sensors\",\"Software Development\",\"Sustainability\",\"Track &amp; Trace\",\"Wireless systems\"],\"articleSection\":[\"Software\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\",\"url\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\",\"name\":\"Intel: Transparency and Security Assurance Drive Preference - Silicon Saxony\",\"isPartOf\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg\",\"datePublished\":\"2023-05-08T11:27:24+00:00\",\"dateModified\":\"2023-06-15T09:01:07+00:00\",\"author\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\"},\"breadcrumb\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage\",\"url\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg\",\"contentUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/silicon-saxony.de\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel: Transparency and Security Assurance Drive Preference\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#website\",\"url\":\"https:\/\/silicon-saxony.de\/en\/\",\"name\":\"Silicon Saxony\",\"description\":\"Germany&#039;s Hightech Network - Semiconductors, Software, Robotics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/silicon-saxony.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\",\"name\":\"publizer2silisax\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g\",\"caption\":\"publizer2silisax\"},\"url\":\"https:\/\/silicon-saxony.de\/en\/author\/publizer2silisax\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intel: Transparency and Security Assurance Drive Preference - Silicon Saxony","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/","og_locale":"en_US","og_type":"article","og_title":"Intel: Transparency and Security Assurance Drive Preference - Silicon Saxony","og_description":"Today, Intel released the results of a study examining how transparency, security innovation and ongoing security assurance impact purchase decisions. Key findings indicated a preference for technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk. Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their security posture and truly unleash the power of data.","og_url":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/","og_site_name":"Silicon Saxony","article_published_time":"2023-05-08T11:27:24+00:00","article_modified_time":"2023-06-15T09:01:07+00:00","og_image":[{"url":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg","type":"","width":"","height":""}],"author":"publizer2silisax","twitter_card":"summary_large_image","twitter_misc":{"Written by":"publizer2silisax","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#article","isPartOf":{"@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/"},"author":{"name":"publizer2silisax","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6"},"headline":"Intel: Transparency and Security Assurance Drive Preference","datePublished":"2023-05-08T11:27:24+00:00","dateModified":"2023-06-15T09:01:07+00:00","mainEntityOfPage":{"@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/"},"wordCount":551,"image":{"@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg","keywords":["Automation","Big Data","Blockchain","Cleanroom","Cloud","Data Security","Digital Twins","Digitization","Ecology &amp; Energy Transition","Edge Computing","Electronics","IC Design","Industrial Internet of Things","IT","Machinery &amp; Plant Engineering","Manufacturing","Mixed Reality","Nanoelectronics","Neuromorphic Computing","Packaging","Process Technologies","Quantum Computing","Research &amp; Development","Robotics","Semiconductor","Sensors","Software Development","Sustainability","Track &amp; Trace","Wireless systems"],"articleSection":["Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/","url":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/","name":"Intel: Transparency and Security Assurance Drive Preference - Silicon Saxony","isPartOf":{"@id":"https:\/\/silicon-saxony.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage"},"image":{"@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg","datePublished":"2023-05-08T11:27:24+00:00","dateModified":"2023-06-15T09:01:07+00:00","author":{"@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6"},"breadcrumb":{"@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#primaryimage","url":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg","contentUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2023\/05\/intel-logo-300x150_7.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/silicon-saxony.de\/en\/intel-transparency-and-security-assurance-drive-preference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/silicon-saxony.de\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Intel: Transparency and Security Assurance Drive Preference"}]},{"@type":"WebSite","@id":"https:\/\/silicon-saxony.de\/en\/#website","url":"https:\/\/silicon-saxony.de\/en\/","name":"Silicon Saxony","description":"Germany&#039;s Hightech Network - Semiconductors, Software, Robotics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/silicon-saxony.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6","name":"publizer2silisax","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g","caption":"publizer2silisax"},"url":"https:\/\/silicon-saxony.de\/en\/author\/publizer2silisax\/"}]}},"_links":{"self":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts\/18141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/comments?post=18141"}],"version-history":[{"count":0,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts\/18141\/revisions"}],"wp:attachment":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/media?parent=18141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/categories?post=18141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/tags?post=18141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}