Today’s rapidly evolving business environment is creating a new set of security challenges. To quickly respond to these needs and stay ahead of high-level security threats, businesses and embedded developers need a comprehensive suite of security solutions that addresses the four critical areas of IT security:
Intel® vPro™ technology is a set of security and manageability capabilities built into the 3rd generation Intel® Core™ vPro™ processor family, the Intel® Xeon® processor E3-1200 v2 family, Intel® chipsets, and network adapters that simplify and accelerate these four critical IT functions.1,2
While Intel vPro technology is conveniently built in, it still requires setup and configuration. Thanks to Intel® Setup and Configuration Software 8.0, IT managers can implement Intel vPro processor–based PCs or workstations in a matter of minutes.2
Learn more about Intel® vPro™ setup and configuration >
Learn about Intel® vPro™ implementation >
Improving system management, lowering software development effort, and increasing security effectiveness can significantly reduce the total cost of ownership (TCO) of embedded systems. Addressing these aspects, Intel® vPro™ technology provides groundbreaking capabilities through Intel® Active Management Technology (Intel® AMT),3 Intel® Virtualization Technology (Intel® VT),4 and Intel® Trusted Execution Technology (Intel® TXT).5 Together, these technologies deliver unprecedented hardware support for advanced management functions, virtualization, and platform security— enabling solutions that cost less to service, provide greater software flexibility, and are more secure.
With security and threat management features built into the hardware, Intel® vPro™ technology offers several benefits to IT managers and embedded developers. The technology protects against difficult-to-detect, penetrating rootkits and malware that threaten users working in cloud or virtual environments by employing Intel® Trusted Execution Technology and Intel® Virtualization Technology. It also enables hardware-based virtualization for PCs or workstations using Intel Virtualization technology for centralized image management and administration, secure network storage, and out-of-band protection—all beyond the firewall.
Traditional forms of account authentication are no longer enough to protect businesses against identity theft or to prevent website access points from being compromised. Intel vPro technology features Intel® Identity Protection Technology (Intel® IPT),6 which provides several critical built-in defenses, including an embedded one-time password, built-in public key infrastructure (PKI), and protected transaction display.
While Intel® IPT helps to ensure that user identity is protected with a unique computer-generated token if the computer is lost or stolen, Intel® Anti-Theft Technology allows IT to remotely lock down the computer, protecting both the user’s identity and corporate data.7 This enhanced security capability is also available on workstations with the Intel® Xeon™ processor E3-1200 v2 product family. Intel vPro technology also accelerates data encryption/decryption using Intel® AES New Instructions,8 encrypting data up to four times faster without interfering with user productivity.9 Even more, it employs Intel® Secure Key,10 a hardware-based encryption technology that generates higher-quality random numbers, making data encryption even more secure for safer online interactions.
Embedded in hardware, Intel vPro technology capabilities are accessed and administered separately from the hard drive, OS, and software applications—in a pre-boot environment. This makes management less susceptible to issues affecting these areas and allows remote access to the PC or workstation, regardless of the system’s power state or OS condition. This technology:
Intel vPro technology enhances the manageability, software flexibility, and security features of automatic teller machines (ATMs), helping embedded developers lower the total cost of ownership and create a more efficient product. Intel AMT enables banks to quickly troubleshoot and repair an ATM remotely, thereby increasing its availability. Intel VT can improve reliability by allowing the bank transaction application to run safely in isolation of non-critical applications, such as advertising videos. Intel TXT protects the ATM by preventing unauthorized software—that was inadvertently loaded onto the system—from starting up.
1. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors may require additional software, hardware, services, and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.
2. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.
3. Security features enabled by Intel® Active Management Technology (Intel® AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.
4. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.
5. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. For more information, see www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.
6. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT) enabled system, including a 2nd or 3rd generation Intel® Core™ processor or an Intel® Xeon® processor E3-1200 v2 product family, enabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.
7. Intel® Anti-Theft Technology (Intel® AT). No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.
8. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
9. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
10. No system can provide absolute security. Requires an Intel® Secure Key-enabled PC with a 3rd generation Intel® Core™ vPro™ processor and software optimized to support Intel Secure Key. Consult your system manufacturer for more information.
11. KVM Remote Control (Keyboard Video Mouse) is only available with Intel® Core™ i5 vPro™ processors and Intel® Core™ i7 vPro™ processors with active processor graphics. Discrete graphics are not supported.