Meltdown Cannot Run malicious code Crash computers Can Read “protected” in-memory data Processor Vulnerability Infographic: Meltdown/Spectre How they Work Who is Affected Caching/Speculative Execution Are you searching for ways to secure your enterprise against threats, like Meltdown and Spectre? Learn how to automate endpoint security configuration management with Client Health. Visit: https://adaptiva.com/products/ Copyright ©2018 Adaptiva. All rights reserved. Designed by Adaptiva Design Lab https://adaptiva.com https://adaptiva.com https://adaptiva.com Protected Memory Speculative Execution Faster Processing Less Security Exploits https://design.adaptiva.com Spectre Risk Grows by Size Every Major OS is Vulnerable Two-Part Solution Performance Hit The Good News Read memory contents during Speculative Execution Personal Machines OS Updates Company Servers Cloud Datacenter Chipmaker Microcode Updates (most cases) Early crashes/problems reported with OS fixes OS fixes may require app updates (e.g.- antivirus) Part 1 Meltdown/Spectre can't crash systems, but some fixes can. Part 2 Protected System Fix causes system slowdown Impact may be negligible Newer systems are less impacted Secure Meltdown/Spectre Before sensitive data is exposed Meltdown Only Spectre Only Apple/Mac OS