Features and Benefits
Built-in technologies address threat management, identity and access, data protection, and monitoring and remediation.
Mobile employees can get more done thanks to enhanced security, manageability, and performance.
Touch-based Ultrabook™ devices give employees more convenience and control—right at their fingertips
More than a tablet and more than a laptop, the Ultrabook™ 2 in 1 offers the best of both in a single device.
Intel-based tablets for business easily integrate into your enterprise environment.
Intel® vPro™ Technology on the Road
All around the U.S., people use Intel® vPro™ Technology to boost their businesses. Now you have the opportunity to collaborate and share your story with the world.
Tell us your story: how does Intel vPro technology help your business?
The best story each month, for six months, wins an Ultrabook™ 2 in 1. Enter today!
Shop Ultrabooks™ for Business
- Dell Latitude 12 7000 Series* Ultrabook™
- Dell Latitude 14 7000 Series* Ultrabook™
- Lenovo ThinkPad T431s* Ultrabook™
- Lenovo ThinkPad Helix* Ultrabook™
- Dell Latitude 6430u* Ultrabook™
- Fujitsu LIFEBOOK U772* Ultrabook™
- HP EliteBook Folio 9470m* Ultrabook™
- Lenovo ThinkPad X1 Carbon* Ultrabook™
1. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT)–enabled system, including a 2nd or higher generation Intel® Core™ processor, an enabled chipset, firmware, software, and participating web site. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.
2. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. For more information, see www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.
3. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.
4. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.
5. Security features enabled by Intel® Active Management Technology (Intel® AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.