An added layer of security for businesses
PCs based on the 3rd generation Intel® Core® vPro™ processor family and workstation platforms based on the Intel® Xeon® processor E3-1200 v2 family with embedded security simplify and accelerate these four critical IT functions. Moreover, they provide an additional layer of protection when combined with security software.
Intel® vPro™ technology is a set of security and manageability capabilities built into the 3rd generation Intel Core vPro processor family, the Intel Xeon processor E3-1200 product family, Intel® chipsets, and network adapters. While Intel vPro technology is conveniently built in, it still requires setup and configuration. Thanks to Intel® Setup and Configuration Software 8.0, IT managers can implement Intel vPro processor-based PCs or workstations in a matter of minutes.1
Prevent attacks below the operating system
With security and threat management features embedded in the hardware, Intel® vPro™ technology:
- Protects against difficult-to-detect, penetrating rootkits and malware that threaten users working in cloud or virtual environments by employing Intel® Trusted Execution Technology2 and Intel® Virtualization Technology3
- Enables hardware-based virtualization for PCs or workstations using Intel Virtualization technology for centralized image management and administration, secure network storage, and out-of-band protection—all beyond the firewall
Learn more about embedded security in the 3rd generation Intel® Core™ vPro technology white paper.
Strengthen authentication and protect passwords
Traditional forms of account authentication are no longer enough to protect businesses against identity theft or to prevent web site access points from being compromised. Intel vPro technology features Intel® Identity Protection Technology (Intel® IPT),4 which provides several critical built-in defenses, including:
- An embedded one-time password that eliminates the cost and support of physical tokens while ensuring secure VPN and web site access and seamless user authentication
- Embedded public key infrastructure (PKI), a second factor of authentication that is stored in firmware and used to authenticate users and servers and encrypt and sign documents, eliminating the need for tokens or smart cards
- Protected transaction display, an encrypted, secure I/O technology, that helps prevent identity theft by enabling businesses and web sites to confirm user presence, verify transactions, and create a secure pin input prior to releasing credentials, thus eliminating risk from screen scrapers or keyloggers
Protect confidential business, employee, and customer information
As the use of cloud computing and the number of mobile PCs in today’s business environment expands, the need for fast, reliable encryption technology to prevent data loss is essential. While Intel® IPT helps to ensure that user identity is protected with a unique computer-generated token if the computer is lost or stolen, Intel® Anti-Theft Technology allows IT to remotely lock down the computer, protecting both the user’s identity and corporate data.5 This enhanced security capability is also available on workstations with the Intel Xeon processor E3-1200 v2 product family. Intel vPro technology also:
- Accelerates data encryption/decryption using Intel® AES New Instructions,6 encrypting data up to four times faster without interfering with user productivity7
- Employs Intel® Secure Key,8a hardware-based encryption technology that generates higher-quality random numbers, making data encryption even more secure for safer online interactions
Built-in security for greater protection9
Today’s rapidly evolving business environment is creating a new set of security challenges. From rootkit attacks to international security breaches, threats have grown more advanced. As employees become more mobile and socially connected, they require new delivery models, such as cloud computing and desktop virtualization, along with the IT support that ensures seamless connectivity.
To quickly respond to these needs and stay ahead of high-level security threats, businesses need a comprehensive suite of security solutions that addresses each of the four most critical areas of IT security:
- Threat management, including protection from rootkits, viruses, and malware
- Identity and web site access point protection
- Confidential personal and business data protection
- Remote and local monitoring, remediation, and repair of PCs and workstations
See how Intel® vPro™ technology works.
Learn more about the key features and benefits of 3rd generation Intel® Core™ vPro™ processors.
Respond to security breaches with speed and agility
Embedded in hardware, Intel vPro technology capabilities are accessed and administered separately from the hard drive, OS, and software applications—in a pre-boot environment. This makes management less susceptible to issues affecting these areas and allows remote access to the PC or workstation, regardless of the system’s power state or OS condition. This technology:
- Allows IT technicians to quickly deploy security patches across PCs, remotely unlock encrypted drives, and manage data security settings
- Gives IT help desk personnel complete control over a platform with features like KVM Remote Control10 with support for three simultaneous display configurations, 27 additional languages, and enhanced mouse improvements across multiple screens
- Enables IT to remotely diagnose, isolate, and repair infected platforms after a security breach occurs
- Uses Intel® Active Management Technology11 (Intel® AMT) to facilitate remote management of platform applications, even when the platform is turned off, as long as the platform is connected to a power line or network
Get connected with the Intel vPro technology IT community and find out more at the Intel® vPro™ Expert Center.
Find your solution stack for Intel vPro technology.