Enterprise Security: Laptop Anti-Theft Protection
Disable access to missing laptops
Giving users access to corporate data and application through remote laptops boosts productivity, but it can also leave IT vulnerable to hackers and misplaced laptops. Intel® Anti-Theft Technology is built into the laptop hardware, helping IT administrators outwit thieves, even when they attempt to reimage the OS, change the boot order, or install a new hard drive. When laptops with Intel® Anti-Theft Technology (Intel® AT) become lost or stolen, they can be remotely disabled. If the laptop is recovered, it can be quickly reactivated to normal operation.
Safeguard corporate laptops with Intel® Anti-Theft Technology
See how Intel® AT provides peace of mind by helping keep company laptops and assets safe.
Maximized hardware-assisted security and manageability with Intel® vPro™ Technology
Intel® vPro™ technology is a set of security and manageability capabilities built into the 2nd generation Intel® Core™ vPro™ processor family, Intel® chipsets, and network adapters.
VideosView More Videos
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
Mobilize A Secure Workforce
Multi-level security with Intel® Anti-Theft Technology in laptops with Intel® Core™ vPro™...
Inside IT: Privacy Principles
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Inside IT: McAfee Drive...
Addressing challenges of maintaining productivity and reliability while protecting data.
Inside IT: Enterprise...
Intel CSO Malcolm Harkins discusses security and privacy.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix...
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing...
Crimeware Protection on 4th...
See how built-in technologies offer protection in threat mitigation, identity, data, and...
Inside IT: Security by Design
Adding security throughout development and manufacturing.
New Approach to Security
Video on stopping rootkits and stealthy threats.
Intel IT Center Webinar
IT Security: Embedded Authentication