The first line of defense, threat management, starts with the prevention of viruses and malware. An intelligent processor with embedded security technologies, like the 4th generation Intel® Core™ vPro™ processor, performs regular integrity checks on client system components, and actively prevent viruses and malware from entering your network.1,2
The next line of defense for identity and access, is about strengthening authentication and protecting passwords. Intel® Identity Protection Technology helps enterprise IT departments protect their access points while reducing costs over traditional hardware token or smartcard methods.3
The third IT security need, and arguably the most critical, is data protection. Intel® Secure Key provides highly secure keys4 for encrypting data, while Intel® Anti-theft Technology automatically locks down your Ultrabook™ should it go missing5 and helps keep thieves out of your sensitive data.
This last line of defense extends across all aspects of IT security management. With remote support and monitoring capabilities embedded into the processor, your help desk staff can access and control the user's computer to resolve issues through all states, including reboot6.
* Other names and brands may be claimed as the property of others.