The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Why You Should Read This DocumentThis guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks• Strengthening authentication and protecting passwords through stronger identity and access security• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.
Managed PKI solutions from Symantec use 3rd generation Intel Core vPro processors to deliver the same level of security as smart card technology.
Animation on McAfee ePO Deep Command*.
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with embedded security and helps CompuCom reduce customers’ costs while increasing security and productivity.
Trusted compute pools with Intel® TXT
Parallels discusses building a cloud with Trusted Compute Pools