Remote Network Management
Diagnose, manage, and help protect your networked systems
From PCs and laptops to ATMs, kiosks, and POS terminals, IT organizations face the challenge of providing enterprise-wide security in an increasingly global business environment. Built into Intel® Core™ vPro™ processors and chipsets, Intel® vPro™ technology1 provides remote management and security capabilities that can help you manage, monitor, and protect your systems.2
Intel® vPro™ technology: Intelligent, hardware-based security
The Intel Core vPro processor family features a robust set of embedded security and management features designed to address key IT concerns. With Intel Core vPro processors, IT departments can quickly and easily:
- Protect data in the cloud and on mobile devices—Intel® Trusted Execution Technology (Intel® TXT)3 and Intel® Virtualization Technology (Intel® VT)4 protect against penetrating rootkits and malware.
- Manage threats remotely—push security updates to users before a breach occurs; diagnose, isolate, and repair infected PCs after a breach takes place.5
- Disable lost or stolen laptops and PCs—Intel® Anti-Theft Technology lets you remotely lock down access to missing or stolen devices, and reactivate them to full functionality if recovered.6
- Deliver faster, more productive user experiences—Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) encrypts data up to four times faster, without slowing performance.78
Enhance your customers' retail experiences
When retail devices such as kiosks, POS terminals, and ATMs deploy Intel® Core™ vPro™ technology,1 they become more than just a way to process transactions. They can help provide a richer customer experience through intelligent performance, security, and stability.
1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.
2. No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware, and software with data encryption, and service activation with a capable service provider. Consult your system manufacturer and service provider for availability and functionality. Service may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.
3. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. For more information, see www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.
4. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.
5. Security features enabled by Intel® Active Management Technology (Intel® AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.
6. No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, and firmware and software optimized to use the technologies. Consult your system manufacturer and software vendor for more information.
7. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information, go to www.intel.com/performance.
8. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.