Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Business Client

Solutions for Small and Large Businesses

Manageability

Unlock the detection, repair, and protection capabilities of Intel vPro® technology. Gain access to tools, technical information, and industry expert support to help you develop software for Intel's premier business platform.

Intel® Active Management Technology (Intel® AMT)

This technology is embedded in Intel®-based platforms to enhance the ability of IT organizations to manage enterprise computing facilities. Intel AMT operates independently of the platform processor and operating system. Remote platform management applications can access Intel AMT securely, even when Intel AMT is turned off, as long as the platform is connected to power and to a network. Independent software vendors (ISVs) can build applications that take advantage of the features of Intel AMT using the application programming interface (API).

Downloads

  • Intel AMT SDK
  • Intel AMT High-Level API

Documentation

  • Get Started Guide
  • Developer Guide
  • Implementation and Reference Guide
  • Intel® Setup and Configuration Software


View All Documentation

Security

Intel vPro Platforms are loaded with features and technologies to deliver best-in-class security protection. Whether it's applying advanced encryption or remotely disabling a stolen or lost PC, systems equipped with Intel vPro technology are designed to keep your data safe.

View the Library

Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)

AES is an encryption standard used to protect network traffic, personal data, and IT infrastructures. Intel® AES-NI accelerates the execution of the AES algorithms by using hardware to implement the complex and performance-intensive steps of these algorithms.

  • Breakthrough AES Performance with Intel AES-NI
  • AES Basics 

Intel® Trusted Execution Technology

This technology provides a hardware-based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS, virtual machine monitor, and operating system.

  • Download the Latest SINIT AC Modules
  • Developer Guide

Digital Random Number Generator (DNRG)

The DNRG consists of RdRand, an Intel® 64 architecture instruction and an underlying DRNG hardware implementation. It provides a high-quality, processor-based RNG solution that is readily available and secure.

  • User Manual for the RdRand Library (Linux* and macOS*)
  • User Manual for the RdRand Library (Windows*)
  • Intel® Secure Key Software Implementation Guide

Instruction Set Architecture Extensions

These extensions improve software robustness, protect applications and data, and accelerate performance.

 
  • Manageability
  • Security
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information
  • Recycling

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo