• <More on Intel.com

Raise PC Security

Raise PC security without reducing user productivity

With the hardware-assisted security features built into Intel® processors, IT can maintain control over PC assets plus maintain application and data integrity–without compromising end user productivity. Intel processors protect assets and enable users with features that facilitate:

  • Faster data encryption
  • Better protection of lost or stolen PCs
  • Quick deployment of security patches
  • Continuous verification of security agent presence on clients

Explore intelligent performance features

View the use cases >

Evaluate Intel® Anti-Theft Technology

Read the discussion >

Explore Intel® vPro™ Technology

Review this technology >

Tighten security along your entire network

Tighten security along your entire network.

2nd generation Intel® Core™ vPro™ processors protect your data and assets while putting powerful, efficient PCs and laptops in the hands of your users.

Data encryption runs up to four-times faster—information travels the Web more quickly and safely thanks to the combination of Intel® AES New Instructions (Intel® AES-NI) and Windows 7* Enterprise.1 2 3

Monitor security settings even when PCs are idle—manage data security settings remotely and unlock encrypted drives requiring pre-boot authentication.4

Disable lost or stolen laptops and PCS—Intel® Anti-Theft Technology lets you remotely lock down access to a missing asset and reactivate to full functionality if recovered.5

Deploy security patches across PCs up to 56% faster—intelligent, hardware-assisted security speeds distribution while presence-checking ensures that security agents are enabled.4 6 7


Product and Performance Information


1. (Cross Client) Cross-client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurations and performance test as follows: (Mobile) Comparing pre-production Intel® Core™ i5-2520M Processor (2C4T, 2.5 GHz, 3 MB cache), Intel reference board, 4 GB (2x2 GB) PC3-10700 (DDR3-1333)-CL9, Hitachi Travelstar* 320 GB hard-disk drive, Intel® HD Graphics 3000, Driver: 2185 (BIOS:v.34, Intel v., Microsoft Windows* 7 Ultimate 64-bit RTM Intel® Core™2 Duo Processor T7250 (2M Cache, 2.00 GHz, 800 MHz FSB), Intel reference board, Micron* 4 GB (2x2 GB) PC3-8500F (DDR3-1066)-400, Hitachi* 320 GB hard-disk drive, Mobile Intel 4 Series Express Chipset Family w/ (BIOS: American Megatrends AMVACRB1.86C.0104.B00.0907270557, (Desktop) Pre-production Intel® Core™ i5-2400 Processor (4C4T, 3.1GHz, 6 MB cache), Intel reference board, Micron* 4 GB (2x2 GB) PC3-10700 (DDR3-1333)-CL9, Seagate* 1 TB, Intel® HD Graphics 2000, Driver: 2185 (BIOS:v.35, Intel v.9.2 0.1009) , Microsoft Windows* 7 Ultimate 64-bit RTM Intel® Core™ 2 Duo E6550 (2C2T, 2.33 GHz, 4 MB cache), Intel DG945GCL Motherboard, Micron 2 GB (2x1 GB) DDR2 667 MHz, Seagate 320 GB hard-disk drive, Intel® GMA 950, Driver:, (BIOS:CL94510J.86A.0034, INF:, Microsoft Windows* 7 Ultimate 64-bit RTM Business productivity claims based on SYSmark* 2007, which is the latest version of the mainstream office productivity and Internet content creation benchmark tool used to characterize the performance of the business client. SYSmark 2007 preview features user-driven workloads and usage models developed by application experts. Multitasking claims based on PCMark Vantage*, a hardware performance benchmark for PCs running Microsoft Windows* 7 or Windows* Vista, includes a collection of various single and multi-threaded CPU, Graphics, and HDD test sets with a focus on Windows* application tests. Security workload consists of SiSoftware Sandra* 2010—AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm. For more information go to www.intel.com/performance.

2. Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.

3. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.

4. Requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware, and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Results dependent upon hardware, setup, and configuration. For more information, visit www.intel.com/technology/vpro/index.htm.

5. No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware, and software with data encryption, and service activation with a capable service provider. Consult your system manufacturer and service provider for availability and functionality. Service may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.

6. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html. 

7. Results shown are from: the 2007 EDS Case Studies "An Analysis of Early Testing of Intel® vPro™ Technology in Large IT Departments," by LeGrand and Salamasick; third-party audit commissioned by Intel, of various enterprise IT environments; and the 2007 Benefits of Intel® vPro™ Technology in the Enterprise, Wipro Technologies study, commissioned by Intel. The EDS studies compare test environments of Intel® vPro™ Technology-based PC environments vs. non-Intel® Core™ vPro™ processor technology-based PC environments. Tested PCs were in multiple OS and power states to mirror a typical working environment. The Wipro study models projected ROI of deploying Intel® vPro™ Technology. Actual results may vary and may not be representative of the results that can be expected for smaller businesses. The study is available at www.intel.com/Assets/PDF/casestudies/cs_eds_vpro.pdf.