Built for business. Engineered for security.2

Active threat protection

The first line of defense, threat management, starts with the prevention of viruses and malware. An intelligent processor with embedded device security technologies, like the 4th generation Intel® Core™ vPro™ processor, performs regular integrity checks on client system components, and actively prevent viruses and malware from entering your network.1,2

Safeguard your identity

The next line of defence for identity and access, is about strengthening authentication and protecting passwords. Intel® Identity Protection Technology helps enterprise IT departments protect their access points while reducing costs over traditional hardware token or smartcard methods.3

Secure your data

The third IT security need, and arguably the most critical, is data protection. Intel® Secure Key provides highly secure keys4 for encrypting data, while Intel® Anti-theft Technology automatically locks down your Ultrabook™ should it go missing5 and helps keep thieves out of your sensitive data.

Monitor your devices remotely

This last line of defence extends across all aspects of IT security management. With remote support and monitoring capabilities embedded into the processor, your help desk staff can access and control the user's computer to resolve issues through all states, including reboot6.

Home
Show/Hide

Product and Performance Information

* Other names and brands may be claimed as the property of others.

  1. Intel® vPro™ technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit http://www.intel.sg/content/www/xa/en/architecture-and-technology/vpro/vpro-technology-general.html
  2. No computer system can provide absolute device security under all conditions. Built-in security features available on selected Intel® Core™ processors and may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.
  3. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel® Core™ processor, enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.
  4. No system can provide absolute security. Intel® Secure Key Technology requires a computer system with an Intel® 3rd Generation Core i5 or i7 processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel Secure Key is available on selected Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-digital-random-number-generator-drng-software-implementation-guide
  5. No system can provide absolute device security under all conditions. Requires an enabled chipset, BIOS, firmware and software, and a subscription with a capable Service Provider. Consult your system manufacturer and service provider for availability and functionality. Service may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.sg/content/www/xa/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.
  6. Security features enabled by Intel® Active Management Technology (AMT) requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup and configuration. For more information, visit Intel® Active Management Technology.