Out-of-the Box Built-in PC Security
Intel® Hardware Shield on Intel vPro® Windows-based PCs provides the most comprehensive security for your business.1
As the frequency, complexity, and severity of cyberattacks continue to rise, trust Intel® Hardware Shield to better protect your users and data. Included with Windows PCs built on Intel vPro®, this collection of security technologies helps defend against modern threats at each layer: hardware, BIOS/firmware, hypervisor, VMs, OS, and applications.
Below-the-OS Security from Attacks at the Firmware and Hardware Levels
Improve overall security with active measures and unique out-of-the-box features exclusive to Intel® Hardware Shield, which includes advanced threat protections, application and data protections, and below-the-OS security.
- Aimed at minimizing the risk of malware injection by using Intel® Hardware Shield to lock down memory in the BIOS when software is running and help prevent planted malware from compromising the OS.
- Help ensure your OS boots securely with Intel® Hardware Shield that offers many hardware-based security capabilities that support a secure boot, allowing your PCs to launch into a trusted state.
Extend Protections of Your Applications and Data with Hardware-Accelerated Virtualization and Encryption
Boost security for virtualized environments with Intel vPro® Enterprise for Windows OS, which extends hardware-rooted features to help protect user access credentials, workspaces, applications, and data in hardened enclaves.
- Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel® Hardware Shield.
- Accelerate virtualized security software like Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel-level malware and browser-based attacks.
- Complement virtualization with hardware-based encryption to help protect data at every layer.
Help Detect and Respond to Advanced Threats
Mitigate extreme attacks like control-flow hijacking, ransomware, and crypto mining.
- Software vendors like Chrome browser and Adobe use Intel® Control-Flow Enforcement Technology (Intel® CET) to help defend against attacks on system memory.
- Help defend against ransomware and living-off-the-land-attacks with Intel® Threat Detection Technology (Intel® TDT). Unique to Intel, Intel® TDT augments existing software-only security solutions to help detect the latest threats with additional minimal impacts on user experience.
Not All Hardware Security Capabilities Are Created Equally
Before you make your next PC purchase, be sure to take a deeper look.
Helps Ensure You Can Trust Newly Received Client Systems
You can rely on your supply chain with the Intel® Trusted Device Setup (Intel® TDS) stamp of OEM attestation.
- Help verify that new PCs have not been tampered with since leaving manufacturing, before corporate security software is installed—even when shipped directly to end users working from home.
- The Intel® TDS OEM remote health attestation service delivers a signed health report and a digital seal that captures events that could pose a security risk, if the device has been tampered with.
- Determine if the PC has been tampered with by detecting chassis intrusion, changes made to the firmware or to BIOS configuration, storage drive replacement, boot while in transit or other changes that break the digital seal.
Built to Move Business Forward
PCs powered by Intel vPro® Enterprise for Windows are built for business. With forward-looking features designed to help you confidently navigate the future of security and empower your team to connect and collaborate more seamlessly. Intel vPro® moves business forward to keep you agile, allow you to scale, and help you realize your goals fast. Anything is possible when you are equipped to do it all.
Complete Management
Save time and help reduce on-site support costs with remote discovery and recovery with Intel® Active Management Technology–even in cases of power loss or OS failure.
Reliable Stability
Intel® Stable IT Platform Program (Intel® SIPP) enables a predictable transition from one technology generation to the next.
Additional Content
Legal Disclosures2 3
Product and Performance Information
All versions of the Intel vPro® platform require an eligible Intel processor, a supported operating system, Intel® LAN and/or WLAN silicon, firmware enhancements, and other hardware and software necessary to deliver the manageability use cases, security features, system performance, and stability that define the platform. See intel.com/performance-vpro for details.
Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates. See backup for configuration details. Learn more at www.Intel.com/PerformanceIndex.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.