The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

We are sorry, This PDF is available in download format only

When it comes to securing and managing data, many IT decision makers struggle with the unknown. What sensitive data does the company have? Is it within the bounds of the corporate network or on a mobile device? Who owns the data, and more importantly, who can access it? And finally, how should we protect it? Symantec* authentication solutions address these questions and challenges by protecting networks, applications, and data against unauthorized access as part of a comprehensive information protection program. By using powerful authentication credentials, Symantec solutions help ensure that the right individual is authenticated to access certain sites and data.

This vendor spotlight features Dave Corcoran, senior product manager at Symantec, discussing two Symantec authentication solutions that leverage Intel® vPro™ technology for stronger data protection.1 The first, Symantec Validation and ID Protection (VIP) Service, delivers cloud-based authentication that combines something you know, such as a username and password, with something you have, such as a card, token, mobile phone, or other credential. Because the authentication service is cloud-based—and leverages the built-in data protection features of Intel vPro technology—you can deploy it without requiring any additional hardware or software. The second solution, Symantec Managed PKI Service, is a proven and trusted public key infrastructure (PKI) solution for mission-critical interactions. Built on Symantec’s globally managed, highly reliable infrastructure, this service reduces the cost and complexity associated with in-house PKI and focuses enterprises on delivering solutions, instead of infrastructure.

1Intel vPro technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more visit

Related Videos