Protecting Data in an Era of Advanced Threat

Consider the immense amount of confidential data currently stored on your network and is accessible via mobile devices. That data includes financial and legal records, employee information, product roadmap plans, supplier agreements, fabrication process trade secrets to name a few. In a climate where manufacturers are increasingly becoming hacking targets, all of that information is very vulnerable to attack.

Develop a Data Protection Strategy Starting with Endpoint Devices

According to a 2017 BDO Manufacturing RiskFactor Report, 96% of manufacturers cited cybersecurity as a risk factor. In addition to deploying secure endpoint devices in the defense against cyberthreats, manufacturers must harden security practices, manage infrastructure, control user access, and invest in data protection. Endpoint devices are a gateway into any organization's IT infrastructure. So your company's security strategy should start with securing end-user devices. If a device is compromised, your entire organization could be compromised. That's why protecting your devices is key to protecting your data.

Ensure Maximum Security for Your Business & Customer Data

Look for devices that offer data protection throughout the lifecycle with built-in security features and services including:

User authentication: Biometric fingerprint or IR (infrared) cameras improve security and enhance the user experience.

Encryption: Enable full-drive encryption at the factory to save IT time when deploying devices. Alternatively, manually enable Microsoft Bitlocker on devices equipped with a Trusted Platform Module (TPM) to encrypt data.

Lenovo Online Data Back-up (OLDB): This next-gen data management solution allows enterprises to securely store confidential information in the cloud with a simple, automatic backup process. It’s quick to set up, requires no additional administrative overhead, offers military-grade security, and is much more affordable and reliable than on-premise solutions. Access multiple versions of data, ensuring you can recover data from any form of cyber attack or accidental data loss.

Remote Secure Erase: Remotely wipe a device in the event it is lost or stolen. Using Intel® Active Management Technology, an IT administrator can erase all data on a system even if it is asleep or shut down, or the OS image is corrupt. This feature also integrates with many common IT management consoles.

Containerization: Isolated virtual containers protect against malware gaining access to devices and data. Typically deployed on smartphones and tablets through mobile device management (MDM) or mobile application management (MAM).

Protection against snooping: Privacy filters fit to new and legacy device screens help prevent others from seeing confidential information.

Port protection: Port security features help protect against physical theft of data via USB and other access ports by disabling or otherwise requiring authentication for their use.

Keep your drive: Typically, under the terms of manufacturer device warranties, when a defective part is replaced, the old component becomes the property of the vendor. A "keep your drive" service allows you to keep your drive(s) and dispose of business data on your terms, improving data security and ensuring compliance with data privacy and retention requirements, as well as mitigating civil liability risks associated with data breaches.

Protecting Data in an Era of Advanced Threat

Manufacturers are increasingly using the cloud & data analytics to make improvements to their infrastructure and processes. As they tap into exciting new technology, manufacturers become more vulnerable to attacks from cyber hackers.

Professor Rajkumar Roy, Cranfield University


  • Many of our devices have multiple security features to protect user identities, devices and the data on them. Ask us today about our multi-factor authentication, encryption and other security features.
  • Our range of screen privacy filters fit to new and legacy device screens, helping prevent others from seeing confidential information.
  • Lenovo’s Online Data Backup (OLDB) solution enables enterprises to securely store confidential information in the cloud with a simple, automatic backup process.