Dashboard

Find Content

Refine Results
Related Content

Active Tags

  • 14 Results
  • Items Per Page

Lenovo on Intel® Anti-Theft Technology (PC Protection Services)

Testimonial video by Lenovo Executives talking about the benefits of Intel® Anti-Theft Technology (PC Protection Services).

Protect Sensitive Data with Intel® Anti-Theft Technology

Product Brief: Intel® Anti-Theft Technology powered by the 2nd generation Intel® Core™ vPro™ processor protects lost or stolen assets for IT managers.

Preview | Download

The Billion Dollar Lost Laptop Problem

White Paper: Intel, Ponemon Institute conduct study of 329 organizations to determine the economic impact of lost or stolen PCs.

Preview | Download

The Cost of a Lost Laptop

White Paper: Intel-sponsored study by the Ponemon institute, 138 separate cases are studied to assess the cost of a lost laptop.

Preview | Download

Enabling Device Independent Mobility with Dynamic Virtual Clients

White Paper: Intel IT considers dynamic virtual client (DVC) technology, where users access applications and information from any device, anytime.

Preview | Download

Protecting Sensitive Data on Laptops is More Important Than Ever

White Paper: Managing and mitigating data breaches, regulations, fines and consequences, and prevention with Intel® Anti-Theft Technology.

Preview | Download

Intel® Anti-Theft Service FAQ

Answers to frequently asked questions about the discontinuation of Intel® Anti-Theft Technology, including the Intel® Anti-Theft Service.

Preview | Download

Intel-Inspired Ultrabook™ Details

Ultra responsive. Ultra sleek. Now More Secure. Powered by an Intel® Core™ processor, the Ultrabook™ gives you performance that keeps up with you.

Laptop anti-theft protection with Intel® Anti-Theft Technology

Laptop anti-theft protection with Intel® Anti-Theft Technology keeps data safe. When a laptop is stolen or missing, access can be remotely disabled

Intel® Anti-Theft Technology Protection Advantages

Info sheet shows how Intel® Anti-Theft Technology protects laptop data through a hardware-based approach.

Preview | Download