A New Level of Built-in PC Security

Intel® Hardware Shield, now available on the 11th Gen Intel vPro® mobile platform, provides the highest performance and most comprehensive hardware-based security for business.1 2

Businesses face increasing numbers, types, complexity, and severity of cyberattacks. Intel® Hardware Shield, exclusive to the Intel vPro® platform, helps protect and defend against modern threats with defense in depth at each layer: hardware, BIOS/firmware, hypervisor, VMs, OS and applications.

Below-the-OS Security from Attacks at the Firmware and Hardware Levels

A Windows 10 Enterprise-based Intel vPro platform offers the unique capabilities of Intel Hardware Shield built-in to deliver the highest level of hardware, software and data protection right out of the box.

  • Minimize the risk of malicious code injection by using Intel Hardware Shield to lock down memory in the BIOS when software is running and help prevent planted malware from compromising the OS.
  • Help ensure your OS boots securely with Intel Hardware Shield that offers many hardware-based security capabilities that support a secure boot, allowing your PCs to launch into a trusted state.

Extend Protections of Your Applications and Data with Hardware-Accelerated Virtualization and Encryption

Enable hardware-based virtualization to help protect user access credentials, workspaces, applications and data in hardened enclaves.

  • Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel Hardware Shield.
  • Accelerate virtualized security software like Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel-level malware and browser-based attacks.
  • Complement virtualization with hardware-based encryption to help protect data at every layer.

Help Detect and Respond to Advanced Threats

Mitigate extreme attacks like control-flow hijacking, ransomware, and crypto mining.

  • Software developers like Microsoft use Intel® Control-Flow Enforcement Technology (Intel® CET), part of Intel Hardware Shield, to help defend against attacks on system memory.
  • Defend against ransomware and malicious crypto mining with Intel® Threat Detection Technology (Intel® TDT), part of Intel Hardware Shield. Hardware-based threat detection to detect the latest threats such as crypto mining and ransomware without an impact on performance.

Built for Business Innovation

Transform computing endpoints into strategic corporate assets by selecting devices built on the Intel vPro® platform.


Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.

Product and Performance Information


In thin light, Windows-based devices, as measured by testing as of December 1, 2020 on Intel® Core™ i7-1185G7 on industry benchmarks, Representative Usage Guide testing, and unique features, including in comparison to AMD Ryzen 7 Pro 4750U, across 3 key usages: productivity, creation, and collaboration, as well as December 2020 IOActive study (commissioned by Intel) comparing Intel® Hardware Shield security capabilities with corresponding technologies in an AMD Ryzen Pro 4750U.


For workloads and configurations visit www.Intel.com/PerformanceIndex. Results may vary.