STOCK TITAN

Intel Study: Transparency and Security Assurance Drive Preference

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary

Intel has released a study indicating that transparency and proactive security measures significantly influence purchasing decisions in technology. Conducted by Ponemon Institute with 1,875 respondents globally, the findings revealed that 73% prefer vendors who actively manage security vulnerabilities, while 76% value hardware-assisted security. The study highlighted vendor characteristics like transparency and ongoing security assurance as critical factors. Intel emphasizes integrating security throughout product development to build customer trust and improve software resilience.

Positive
  • 73% of respondents prefer purchasing from proactive technology providers regarding security vulnerabilities.
  • 76% prioritize hardware-assisted capabilities that mitigate software exploits.
  • Intel's focus on integrating security into product design enhances customer trust.
Negative
  • 48% of respondents feel their technology providers do not adequately address security vulnerabilities.
  • 47% say their providers lack transparency about security updates and mitigations.

Today, Intel released the results of a study examining how transparency, security innovation and ongoing security assurance impact purchase decisions. Key findings indicated a preference for technology providers that are transparent and proactive in helping organizations manage their cybersecurity risk.

Building security and privacy into products from concept to retirement is not only a strong development practice but also important to enable customers to understand their security posture and truly unleash the power of data.

“Security doesn’t just happen. If you are not finding vulnerabilities, then you are not looking hard enough,” said Suzy Greenberg, vice president, Intel Product Assurance and Security. “Intel takes a transparent approach to security assurance to empower customers and deliver product innovations that build defenses at the foundation, protect workloads and improve software resilience. This intersection between innovation and security is what builds trust with our customers and partners.”

Study Highlights

Ponemon Institute independently conducted a survey of 1,875 individuals in the United States; the United Kingdom; Europe, the Middle East and Africa; and Latin America who are involved in overseeing the security of their organizations’ information technology (IT) infrastructure. In addition, respondents are familiar with their organizations’ purchases of IT security technologies and services.

Key findings from the study, sponsored by Intel, include:

  • Seventy-three percent of respondents say their organization is more likely to purchase technologies and services from technology providers that are proactive about finding, mitigating and communicating security vulnerabilities. Forty-eight percent say their technology providers don’t offer this capability.
  • Seventy-six percent of respondents say it is highly important that their technology provider offer hardware-assisted capabilities to mitigate software exploits.
  • Sixty-four percent of respondents say it is highly important for their technology provider to be transparent about available security updates and mitigations. Forty-seven percent say their technology provider doesn’t provide this transparency.
  • Seventy-four percent of respondents say it is highly important for their technology provider to apply ethical hacking practices to proactively identify and address vulnerabilities in its own products.
  • Seventy-one percent of respondents say it is highly important for technology providers to offer ongoing security assurance and evidence that the components are operating in a known and trusted state.

Vendor Characteristics

The key findings indicate that specific vendor characteristics affect purchase decisions. In some cases, there is a significant gap between the importance of these characteristics and the ability of the provider to have the capability. Characteristics include:

  • Transparency about security updates and available mitigations.
  • Vendor’s ability to identify vulnerabilities in its own products and mitigate them.
  • Ongoing security assurance and evidence that the components are operating in a known and trusted state.
  • Hardware-assisted capabilities to help protect distributed workloads and data in use, and to defend against software exploits.

Developing the strongest products requires power, performance and security. Security capabilities rooted in hardware not only provide security assurance against current threats, but also improve software reliability and provide additional layers of protection at the foundation and across workloads to protect against future threats.

Intel’s approach is driven by extensive research and continuous integration of key learnings throughout the development processes and practices. As a result, Intel products are designed to deliver security assurance and advance security capabilities.

To read the full report, go to: The Role of Transparency and Security Assurance in Driving Technology Decision-Making

More: 2020 Product Security Report | People, Processes, Products Define Intel’s Security Strategy, Intel Newsroom | Silicon as Code, the Cybersecurity Vulnerability Paradox, and the Transparency Requirements for a 21st Century Processor Vendor (IDC white paper, sponsored by Intel)

About Intel

Intel (Nasdaq: INTC) is an industry leader, creating world-changing technology that enables global progress and enriches lives. Inspired by Moore’s Law, we continuously work to advance the design and manufacturing of semiconductors to help address our customers’ greatest challenges. By embedding intelligence in the cloud, network, edge and every kind of computing device, we unleash the potential of data to transform business and society for the better. To learn more about Intel’s innovations, go to newsroom.intel.com and intel.com.

© Intel Corporation. Intel, the Intel logo and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.

FAQ

What were the key findings from Intel's recent security study?

The study found that a majority of organizations prefer vendors that proactively address security vulnerabilities and offer hardware-assisted capabilities.

How does transparency influence purchase decisions according to Intel's study?

The study indicates that 64% of respondents value transparency about security updates, impacting their purchasing decisions.

What percentage of respondents prioritize ongoing security assurance from technology vendors?

71% of respondents find ongoing security assurance highly important when choosing technology providers.

What is the significance of hardware-assisted security according to the study?

76% of respondents stated that it is highly important for technology providers to offer hardware-assisted capabilities to mitigate software exploits.

Who conducted the survey for Intel's security study?

The Ponemon Institute independently conducted the survey involving 1,875 individuals overseeing IT security across various regions.

Intel Corp

NASDAQ:INTC

INTC Rankings

INTC Latest News

INTC Stock Data

105.71B
4.31B
0.06%
64.52%
2.45%
Semiconductors
Semiconductors & Related Devices
Link
United States of America
SANTA CLARA