By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: How your laptop can help boost your enterprise security posture
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Cybersecurity > How your laptop can help boost your enterprise security posture
CybersecurityEnterprisePCSoftware

How your laptop can help boost your enterprise security posture

Techgoondu
Last updated: January 20, 2022 at 6:23 PM
Techgoondu
Published: January 19, 2022
8 Min Read
SHARE
  • PHOTO: fancycrave1 from Pixabay

Brought to you by AMD

Until recently, the way a business set up to defend itself from cyberattacks was very similar to how castles erected fortifications in ancient times.

A moat around the structure would make it harder for invaders to gain direct access to their target, rather like how a firewall works to keep out cyber intruders.

Today, we know perimeter defences are not enough. Cyber attackers employ Trojans today in the form of well designed malware that make the defenders inadvertently let in the intruders themselves.

That’s not to mention the idea that many people don’t keep inside the relatively safe confines of the “castle”, or in this case, an office that is well protected from the outside.

The pandemic has made working remotely a norm rather than exception. Today’s devices, including laptops that employees use, are no longer sitting behind office firewalls but connected at home via private Wi-Fi networks and broadband Internet links.

This means enterprises need to find a way to better secure their endpoint devices, as part of a holistic defence against new threats.

One increasingly important part of the strategy is the hardware used in these office-issued laptops. The first step to a modern defensive posture is getting these devices tightened up.

The right setup helps to reduce exposure to attacks, can reduce downtime, may require fewer patches, and can help to improve the total cost of ownership.

This is where AMD Ryzen™ PRO 5000 Series Mobile Processors and AMD PRO Security come in. Laptops equipped with them bring multi-layered protection, enabling users to be productive while protected from evolving cyber threats.

On an AMD Ryzen™ PRO 5000 Series Mobile Processor, there are actually five layers of security that are tightly integrated to help protect the data your laptop accesses:

1. AMD Secure Processor

A piece of dedicated hardware in each system-on-a-chip (SoC), AMD Secure Processor (ASP) helps anchor a hardware root of trust on which other layers of security rest.

Through this, a laptop will boot up securely and establish an isolated Trusted Execution Environment where software can be run on a secure platform.

The ASP is isolated from other parts of the SoC because the host SoC cannot access its memory. ASP also incorporates several important components, including a Cryptogenic Co-processor (CCP), which extends more protection to PC users.

The CCP is a crypto block that provides cryptographic functionality for key generation and key management. Since cryptographic operations are implemented in hardware, they are faster for time-sensitive operations.

2. AMD Platform Secure Boot

The AMD Platform Secure Boot also provides a hardware root of trust to authenticate the initial firmware, including BIOS during bootup.

When a PC is fired up, the ASP boot ROM code is executed, authenticating other firmware components before the operating system is started.

This helps in platform integrity by warding off malicious firmware that may trick a PC into booting up with malicious code and opening it up to further attacks later on.

3. AMD Memory Guard

Protecting system memory is just as important as low-level firmware as seen in the previous two layers of security. Here, AMD Memory Guard offers full memory encryption that helps protect sensitive data, even when a physical attack is mounted.

With this, DRAM contents are encrypted with a random key, which helps provide protection against physical cold boot, DRAM interface snooping, and similar types of attacks.

Even someone physically extracting a memory module (on systems using NVDIMM) will find it hard to extract its contents because of the encryption engine in the on-die memory controller.

Each controller includes a high-performance Advanced Encryption Standard (AES) engine that encrypts data when it is written to DRAM and decrypts it when read. This prevents data to be stolen when it is in-memory.

4. AMD Shadow Stack

Next up in the protection layers is AMD Shadow Stack, which is a robust tool against sophisticated and increasingly popular Return-on-Programming (ROP) attacks that try to gain control of a system by exploiting weaknesses in the legitimate code.

In such an attack, a hacker would modify what is known as a routine return address, which programs use to complete an action or job, to again access to a system.

AMD Ryzen™ PRO 5000 series mobile processors help mitigate ROP attacks by providing software access to special registers in the CPU where a copy of the return address can be stored and checked against.

Since this is stored on hardware, it is difficult for malicious code to tamper with, thus reducing the risk of an ROP attack.

Microsoft Hardware Enforced Stack Protection is also supported on AMD Ryzen™ PRO 5000 series mobile processors using AMD Shadow Stack.

5. Microsoft Secured-Core PC

Just as important to the multi-layered defence is Microsoft Secured-Core PC, which helps protect your device from firmware vulnerabilities, shields the operating system from attacks, and can prevent unauthorised access to devices and data through advanced access controls and authentication systems.

AMD has various platforms that enable Secured-Core PC on a PC. They include AMD-V with GMET, a set of hardware extensions that enable virtualisation on AMD platforms.

Guest Mode Execute Trap (GMET) is a silicon performance acceleration feature which enables the hypervisor to efficiently handle code integrity checks and help protect against malware.

While there is no failsafe answer to increasingly complex cybersecurity challenges, today’s businesses at least have more advanced tools to ready themselves and reduce the uncertainty of a digital future.

The starting point for many has to be the most basic of devices – laptops and PCs – that are in use every day to log in to corporate servers and handle sensitive data.

At the root of these devices is a processor that should not just be powerful enough to crunch spreadsheets and presentations faster but also provide the foundation of trust from which a successful cybersecurity strategy can be built.

Find out more about AMD Secure Pro features in AMD Ryzen™ PRO 5000 Series Mobile Processors that can be a core part of your organisation’s cybersecurity strategy here.

Google Meet, Gmail and other G Suite tools get security boost
What to expect as Singapore spends S$3.8 billion on government digitisation in 2021
Digital businesses risk failure as IT teams struggle to cope: Gartner
Google to use solar energy from 500 HDB flats to help power Singapore operations
Intel to have 5G built into Dell, HP, Lenovo and Microsoft PCs by 2019
TAGGED:AMDAMD Secure ProcessorcybersecuritylaptopMemory GuardRyzen ProSecured-Core PCShadow Stack

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Previous Article Meeting the healthcare sector’s unique challenges
Next Article Sony Alpha 7 Mark IV review: An evolved hybrid shooter for the prosumer
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?