The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

We are sorry, This PDF is available in download format only

Intel IT Center Real-World Guide to 3rd Generation Intel Core vPro Processors

Why You Should Read This Document

This guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:
• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks
• Strengthening authentication and protecting passwords through stronger identity and access security
• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs
• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC

Related Videos