Intel developing security 'game-changer'
Intel CTO says new technology will stop zero-day attacks in their tracks
Computerworld - Intel's chief technology officer says the chip maker is developing a technology that will be a security game changer.
Justin Rattner told Computerworld on Tuesday that scientists at Intel are working on security technology that will stop all zero-day attacks. And, while he would give few details about it, he said he hopes the new technology will be ready to be released this year.
"I think we have some real breakthrough ideas about changing the game in terms of malware," Rattner said. "We're going to see a quantum jump in the ability of future devices, be them PCs or phones or tablets or smart TVs, to defend themselves against attacks."
He noted that the technology won't be signature-based, like so much security is today. Signature-based malware detection is based on searching for known patterns within malicious code. The problem, though, is that zero-day, or brand-new, malware attacks are often successful because they have no known signatures to guard against.
Intel is working around this problem by not depending on signatures.
And the technology will be hardware based, though it's still unclear if it will have a software component.
"Right now, anti-malware depends on signatures, so if you haven't seen the attack before, it goes right past you unnoticed," said Rattner, who called the technology "radically different".
"We've found a new approach that stops the most virulent attacks. It will stop zero-day scenarios. Even if we've never seen it, we can stop it dead in its tracks," he said.
Dan Olds, an analyst with The Gabriel Consulting Group, said if this technology works as Rattner says it will, it could be a major advance for computer security.
"If Intel has hardware technology that can reliably stop zero-day attacks, that would be a huge win in the war against malware," Olds said. "The key is that it's reliable. It has to have the ability to discern legit software from malware. But if they can pull this off, it would give them quite a competitive advantage vs. AMD."
And Olds noted that technology that takes advantage of hardware could be interesting.
"The best security is a combination of hardware and software," he said. "Hardware security can be stronger and faster in some situations, but isn't as flexible as software-only mechanisms. The big change here is that it sounds like Intel is pulling security functions into the chip or the chipset."
Rattner said Intel researchers were working on the new security technology before the company moved to buy security software maker McAfee. However, he said that doesn't mean that McAfee might not somehow be involved.
With that $7.68 billion deal, Intel will become more than just a chip maker. It will become a security company, as well.
Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin or subscribe to Sharon's RSS feed . Her e-mail address is email@example.com.
- Intel confirms using ARM-based chip core in smartwatch it demoed at CES
- You'll want a PC with Intel's new chip for the battery life alone
- Desktop chips zip past 4GHz; next stop 5GHz?
- After a tough year, Intel and HP push ahead on Itanium
- Dell testing 64-bit ARM server with AppliedMicro chip
- Physicist says Moore's Law is 'collapsing'
- Intel's Ivy Bridge chips raise the bar for rivals
- Intel ready to take on tablet chips
- AMD execs tout firm's tablet plans
- AMD moves away from Intel rivalry, rethinks course
Read more about Processors in Computerworld's Processors Topic Center.
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Gartner Magic Quadrant for Application Security The market for application security testing is changing rapidly. Technology trends, such as mobile applications, advanced Web applications and dynamic languages, are forcing...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Processors White Papers | Webcasts