Why You Should Read This Document
This guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:
• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks
• Strengthening authentication and protecting passwords through stronger identity and access security
• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs
• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Accenture ARROW* and Intel® vPro™ technology enhance remote PC management to allow technicians to focus on and fix complex hardware problems.
McAfee and Intel integrated security solutions combine McAfee's leading security software with the security and remediation of Intel® Core™ vPro™.
Animation on McAfee ePO Deep Command*.
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with embedded security and helps CompuCom reduce customers’ costs while increasing security and productivity.