Built for business. Engineered for security.2

Active threat protection

The first line of defense, threat management, starts with the prevention of viruses and malware. An intelligent processor with embedded security technologies, like the 4th generation Intel® Core™ vPro™ processor, performs regular integrity checks on client system components, and actively prevent viruses and malware from entering your network.1,2

Safeguard your identity

The next line of defense for identity and access, is about strengthening authentication and protecting passwords. Intel® Identity Protection Technology helps enterprise IT departments protect their access points while reducing costs over traditional hardware token or smartcard methods.3

Secure your data

The third IT security need, and arguably the most critical, is data protection. Intel® Secure Key provides highly secure keys4 for encrypting data.

Monitor your devices remotely

This last line of defense extends across all aspects of IT security management. With remote support and monitoring capabilities embedded into the processor, your help desk staff can access and control the user's computer to resolve issues through all states, including reboot5.

Home
Show/Hide

Product and Performance Information

* Other names and brands may be claimed as the property of others.

  1. Intel® vPro™ technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit http://www.intel.sg/content/www/xa/en/architecture-and-technology/vpro/vpro-technology-general.html
  2. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors and may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.
  3. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel® Core™ processor, enabled chipset, firmware, and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.
  4. No system can provide absolute security. Intel® Secure Key Technology requires a computer system with an Intel® 3rd Generation Core i5 or i7 processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel Secure Key is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-digital-random-number-generator-drng-software-implementation-guide
  5. Security features enabled by Intel® Active Management Technology (AMT) requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup and configuration. For more information, visit Intel® Active Management Technology.