The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
Jack Gold and Peter Kastner provide perspectives on the 2nd generation Intel® Core™ vPro™ processor family.
Intel® Setup and Configuration Software 8.0 Easy Configuration
2nd Generation Intel® Core™ Processor Family
Rootkit and Stealthy Threat Prevention Video
Strong Authentication and Efficient Data Protection
What is McAfee ePO Deep Command*
McAfee Deep Defender*: Hidden Malware Protection
Taking Control of Security: Key Log and Pin Pad Screen Scraping
Security Preparation: BIOS Based Root Kit Attack
Intel® Core™ vPro™ Technology: End User Productivity
Altiris Client Management Suite* with Intel vPro Technology
Intel® Core™ vPro™ Technology: Easy Reimaging
Intel® Core™ vPro™ Technology: Power Management
Intel IT Moves to Intel-Based PCs, Microsoft Windows 7*
Accenture, Intel Remote Management Solutions
Mobilize Your Workforce Without Compromising Security
Intel® AMT setup is fast and easy with remote configuring and patching for time and cost savings.
Intel ensures data protection through innovation, and developing secure systems, standards, and policy.
See how the 2nd generation processors stack up in this two-page good-better-best comparison brief.Preview | Download
Video takes a quick, high-level look at capabilities of 2nd generation Intel® Core™ processor family.
New! The 3rd generation Intel® Core™ vPro™ processor comes with embedded security features.