Laptop anti-theft protection with Intel® Anti-Theft Technology keeps data safe. When a laptop is stolen or missing, access can be remotely disabled
Protect laptops with Intel® Anti-Theft Technology and keep data safe. When a notebook is reported stolen or missing, access can be remotely disabled in minutes. If the notebook is recovered, IT can quickly restore the system.
Intel® I/O Controller Hub 10 family covers errata, specification changes and clarifications, and document changes.
This document is a compilation of device and document errata and specification clarifications and changes, and is intended for hardware system manufacturers and for software developers of applications, operating systems, and tools.
White Paper: Intel IT considers dynamic virtual client (DVC) technology, where users access applications and information from any device, anytime.
Intel IT is investigating a model where users can access their applications and information from any device, anywhere, anytime.
White Paper: Managing and mitigating data breaches, regulations, fines and consequences, and prevention with Intel® Anti-Theft Technology.
Discusses risks and costs with the increase in data breaches and vulnerability, complying with security regulations, and managing and mitigating risks with Intel® Anti-Theft Technology.
Testimonial video by Lenovo Executives talking about the benefits of Intel® Anti-Theft Technology (PC Protection Services).
Testimonial video by Lenovo Executives talking about the benefits of Intel® Anti-Theft Technology (PC Protection Services).Full View >
Product Brief: Intel® Anti-Theft Technology powered by the 2nd generation Intel® Core™ vPro™ processor protects lost or stolen assets for IT managers.
Keep data and assets secure in a mobile environment with Intel® Anti-Theft Technology (Intel® AT) and WinMagic SecureDoc*.
White Paper: Intel® Anti-theft Technology, Symantic PGP*, deter theft, reduce risks to the organization, and limit access to corporate data.
Benefits of deploying PGP Whole Disk Encryption* to deter theft, reduce risks to the organization, and limit access to corporate data.