Increase your security posture with Intel® Authenticate solution, a hardware-enhanced identity protection solution. Intel® Authenticate solution delivers customizable multifactor authentication options to fit your IT policy needs while giving you a comprehensive solution that is easy to deploy. It is available on select 6th and 7th generation Intel® Core™ vPro™ platforms.
With misused and stolen user credentials causing 63 percent of today’s data breaches1, providing identity protection in the hardware is one of the smartest ways to defend your business. Intel® Authenticate solution is designed to verify two or more factors for maximum coverage. These factors are captured, encrypted, matched, and stored in the hardware—reducing exposure to common software-level attack methods.
Keep your workforce protected by combining a variety of tailored factors to validate a user's identity. IT can choose different authentication factors like fingerprint, Bluetooth proximity, protected PIN, and location detection using Intel® Active Management Technology (Intel® AMT). New 7th Generation Intel® Core™ vPro™ processor-based devices also support virtual smart cards and additional factors from OEMs and hardware partners, giving you more choices for policy customization.
Rest easy with a smooth deployment as Intel® Authenticate solution integrates into existing network environments. IT has the flexibility to create and deploy customized hardened multifactor authentication policies to enforce user identity protection for access to the corporate domain, network and VPN. Intel® Authenticate solution provides a simple self-service enrollment tool for end users to quickly get started, eliminating calls to IT. It also works with existing device and policy management tools today like Microsoft System Center Configuration Manager (SCCM)*, Active Directory Group Policy Objects (GPO)* and McAfee® ePolicy Orchestrator® software.
Designed for demanding business needs, Intel® 3D NAND SSD products provide reliable, high-speed storage with advanced security capabilities.
The 2015 Data Breach Investigations Report (DBIR) by Verizon*, http://www.verizonenterprise.com/DBIR/2015/.
Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at http://www.intel.com.au.