fbpx Skip to content

The ThinkShield Story Part 1: The Challenge

The coming cloud – April 30, 2008

By G C Network | May 18, 2008

I attended the IBM Public Sector briefing this morning. The IBM executives were clearly basking in a financial performance glow. After ending 2007 with increases in revenue, profit and earnings per share, IBM also turned in an impressive 1Q’08. This being a partner conference, a big highlight was the fact that 36% of IBM’s revenue…

Google, Cloud Computing, and the US Intelligence Community – April 29, 2008

By G C Network | May 18, 2008

Just arrived in Los Angeles for the IBM Business Partner Leadership Conference. IBM is billing this as a “new” conference, but I have my doubts. I am, however, very interested in hearing many of the speakers, particularly Eric Schmidt, Chairman and CEO of Google. His presentation on “The Future of the Web, Cloud Computing and…

Location Based Services – April 25, 2008

By G C Network | May 18, 2008

INmobile.org is a exclusive community for executives in wireless industry. As a member, I have the opportunity to participate in a number of interesting discussions about mobile and wireless technology. Here’s a summary of the points made in a recent discussion about location based services. Thanks goes to Adam Zawel for this excellent summary. CARRIER’S…

IBM Business Partner Leadership Conference – April 23, 2008

By G C Network | May 18, 2008

I just completed registration for the IBM Business Partner Leadership Conference. This is a new invitation-only conference being held this year in Los Angeles from Wednesday, April 30th through Friday, May 2nd. I’m looking forward to renewing my IBM contacts “in person” versus the “virtual” meetings that have become such a fixture of today’s business…

Telephone & Web = WOW !! – April 21, 2008

By G C Network | May 18, 2008

The power of the Internet and the web lies in its ability to provide access to information. The mobile web takes this one step further with its ability to provide information relevant to a specific location. Although the promise of this marriage is mind boggling, computer and smart-phone keyboards have slowed the adoption and widespread…

The Power of Family Oral History – April 19, 2008

By G C Network | May 18, 2008

Although I just started this yesterday, I’ve decided to backdate this entry to last Saturday, April 12, 2008. That’s when my family had it’s 3rd Annual Black History Party. The main reason I’m doing this is because of the life lesson that experience taught me. That lesson was the power of family oral history. For…

So much to blog ….Entry for April 19, 2008

By G C Network | May 18, 2008

When I started this yesterday, I had a list of about five things I wanted to say on this blog. I then decided on a strategy to list topics as I thought of them and then only have one entry a day. Then later, I heard this great sucking sound. It was as if a…

Hello World ! – May 18, 2008

By G C Network | May 18, 2008

I’ve been toying with the idea of doing a blog for about six months now. Initially I didn’t see how any of my contributions to the blogosphere would matter to the world. The importance of this view, however, waned as I became more and more absorbed by the power of Web 2.0. As my participation…

The cybersecurity challenge seems to be growing daily. Threats are becoming more sophisticated, and attacks are becoming more destructive while the corporate world’s response seems to resemble a deer in headlights. Recent examples of this dangerous state of affairs include[1]:

In addition to this criminal threat, governments around the world are passing and enforcing new privacy and data protection laws that impose severe violation penalties. Examples of this are:

The top agenda item for just about every Board of Directors now is how to protect corporate data, flowing across the threat infested Internet, to multiple endpoint devices, that have a virtually unknown pedigree.

One company, Lenovo, has taken up the challenge with ThinkShield, a revolutionary approach to securing devices through their entire lifecycle. As a global manufacturer of smartphones (Motorola), tablets, PCs (ThinkPad, Yoga, Lenovo Legion), workstations, AR/VR devices, and data center solutions (ThinkSystem, ThinkAgile) this international technology leader is creating capabilities and computing power that changes both business and society.

Anchored by secure device design process, Lenovo builds protection into its products. Through a strategic partnership with Intel®, Lenovo has aligned with the Intel Transparent Supply Chain to provide visibility into the source components of every new system. Lenovo oversees the security of suppliers who build intelligent components, making sure they conform to rigorous, Trusted Supplier Program guidelines and best practices. The ThinkShield ecosystem’s lifecycle approach also includes:

  • The industry’s first and only FIDO®-certified authenticators that use match-on-chip fingerprint technology that gives companies safer, easier ways to protect employees’ identities;
  • An industry-leading level of integration with Intel Authenticate that offers higher security and flexibility through the use of up to 8 authentication factors;
  • BIOS-based Smart USB protection that keeps employee PCs safer by restricting USB port response to keyboards and pointing devices only;
  • WiFi Security, in partnership with Coronet, that detects threats and notifies users when they are about to connect to unsafe wireless networks;
  • BUFFERZONE® technology that isolates online threats before they infect the whole organization;
  • MobileIron® Endpoint Management that provides a secure, simple way to unify cloud and endpoint security across multiple devices;
  • Absolute® Persistence™ technology that provides an unbreakable connection from IT admins to all corporate devices so that they can leverage enriched asset intelligence, automate endpoint hygiene, and continuous compliance monitoring;
  • End of life data disposal process that keeps potentially sensitive data secure by wiping the drives and securely recycling the parts.

Over the next few months, I will be sharing the details of this exciting cybersecurity protection breakthrough by exploring how it can help organizations operate globally within a drastically enhance security environment. Subsequent posts will address:

  • Part 2: The Threat – The current and evolving security threat to hardware, software, and data protection processes
  • Part 3: Protecting Hardware – Organizational, IT Administrator and IT User roles and activities needed to protect IT hardware
  • Part 4: Protecting Software – Organizational, IT Administrator and IT User roles and activities needed to protect IT software
  • Part 5: Security Processes – Organizational, IT Administrator and IT User roles and activities needed to establish effective security processes
  • Part 6: Enhancing Your Security – Effectively defending against online threats through a people-centric approach

Looking forward to engaging with you through this journey.

This post is sponsored by Lenovo.

[1] https://www.wired.com/story/biggest-cybersecurity-crises-2019-so-far/

[2] https://www.cpomagazine.com/data-protection/gdprs-big-moment-has-just-arrived-with-a-228-million-data-breach-fine/

Posted in

G C Network

Leave a Comment


Purchase Crate

Shipping and discount codes are added at checkout.

Scroll To Top