Help prevent unauthorized access to business accounts and access points with embedded, tamper-resistant two-factor authentication.1See how Intel® Identity Protection Technology works >
Help keep company laptops and assets safe, remotely disable stolen laptops, and reactivate recovered ones.2Discover how Intel® Anti-Theft Technology keeps thieves and hackers at bay >
Actively help prevent viruses, malware, and sophisticated rootkit attacks from ever entering your fleet of PCs.3See how embedded technologies perform regular integrity checks on PC system components >
Built-in virtualization technologies can help improve security by controlling OS and application updates.4Learn more about Intel® Virtualization Technology (Intel® VT) >
Discover how accelerated hardware-based encryption technologies help make online interactions safe and seamless.5Learn more about Intel® Advanced Encryption Standard–New Instructions (Intel® AES–NI) >
Configure, diagnose, isolate, and repair an infected PC—even if it’s unresponsive—with remote support and monitoring capabilities embedded into select Intel® vPro™ processors.6Learn more about Intel® Active Management Technology >
Unlocking the Value of Intel® vPro™ Technology
Automatically discover, setup and configure, and maintain a secure connection to every managed device on your network with Intel® Setup and Configuration Software.Unlock the features of Intel® vPro™ technology with Intel® Setup and Configuration Software >
Follow a step-by-step process to start taking full advantage of Intel® vPro™ technology.Learn more about implementing Intel® vPro™ Technology >
1. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT)–enabled system, including a 2nd or higher generation Intel® Core™ processor, an enabled chipset, firmware, software, and participating web site. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.
2. No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware, and software with data encryption, and service activation with a capable service provider. Consult your system manufacturer and service provider for availability and functionality. Service may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.
3. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. For more information, see www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.
4. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.
5. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
6. Security features enabled by Intel® Active Management Technology (Intel® AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.