• <Mehr auf Intel.com

3rd Generation Intel® Core™ vPro™ Processor

Embedded security that delivers an additional layer of protection

Leider ist diese PDF-Datei nur im Download-Format verfügbar.

Why You Should Read This Document

This guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:
• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks
• Strengthening authentication and protecting passwords through stronger identity and access security
• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs
• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC