Encrypted Data Security

Easy to deploy and manage, and transparent to workers.

Intel® Data Guard is a hardened data encryption solution that protects files on IT-managed PCs and works with existing IT tools. Intel® Data Guard is simple to use and provides flexibility for employees to easily control their file properties. It will be offered on 6th and 7th Generation Intel® Core™ vPro™ processor-based devices, with general availability later in 2017.

Introducing Intel® Data Guard

Learn more about Intel® Data Guard, a hardware-based file, and folder encryption system that addresses security issues and helps reduce data compromise and data loss, providing protection at the point of creation and throughout the data lifecycle.

Watch the video now

Continual Data Protection

In 2016, the average cost of a data breach was $4M1. Companies are spending more money on data protection, but the risks continue to increase. Now with Intel® Data Guard, employee files are automatically encrypted and remain protected on IT-managed PCs when stored locally, in the cloud, or on a USB drive. It also takes advantage of other Intel security technologies (Intel® Converged Security and Manageability Engine and Intel® Software Guard Extensions) to generate, store, and retrieve highly sensitive information like group policies, encrypted keys, and access controls. This hardware-enhanced protection makes data breaches much more difficult.2

Accessible only to Authorized Users

Intel® Data Guard provides sophisticated management to bind encrypted files to the employees’ machine and their corporate identity to ensure that only authorized Active Directory users have access. If a user’s Active Directory privileges are revoked, they will no longer have access to the files.2

Easy to Deploy and Easy to Use

With Intel® Data Guard, the capabilities for hardened data protection are built in to the 6th & 7th Generation Intel® Core™ vPro™ processors. Rest easy with a smooth deployment in your existing environment, including support for Microsoft System Center Configuration Manager (SCCM) to configure your policies. The Intel® Data Guard application can be pushed by IT with no user interaction, so employees can get started quickly without calls to IT.2 Employees’ experience is simple – their files are protected with little or no extra steps needed, allowing them to focus on their work with peace of mind.

Related Technologies

Get in front of security with hardware-enhanced identity protection, customizable multifactor authentication options to fit your policies, and an end-to-end solution that’s easy to deploy.2

Learn more about Intel® Authenticate solution

Save time with remote maintenance and wireless manageability for your mobile workforce, and help secure drive wiping to simplify PC lifecycle transitions.2 3

Learn more about Intel® AMT

Intel® Identity Protection Technology (Intel® IPT) with Public key infrastructure (PKI)2 is a second factor authentication for business and web services that validates when a legitimate user—not malware—is logging in from a trusted PC.

Learn more about Intel® IPT with PKI

With advances in performance, productivity, data security, and identity protection, upgrading your PCs is good for business.

Learn more about Intel® vPro™ technology

The Digital Workplace

Learn more on how the 7th Gen Intel® Core™ vPro™ Processor is making the digital workplace a reality across the areas IT cares about – security, productivity, and manageability. See the latest blog from Intel executive Tom Garrison that talks about the benefits of Intel® Data Guard for data protection.

Read the blog post now

Product and Performance Information

2

Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at http://www.intel.com.

3

Intel® Active Management Technology (Intel® AMT) requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup & configuration. For more information, visit www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.