The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Why You Should Read This DocumentThis guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks• Strengthening authentication and protecting passwords through stronger identity and access security• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Accenture ARROW* and Intel® vPro™ technology enhance remote PC management to allow technicians to focus on and fix complex hardware problems.
New Intel® processors with built-in security.
McAfee and Intel integrated security solutions combine McAfee's leading security software with the security and remediation of Intel® Core™ vPro™.
Animation on McAfee ePO Deep Command*.