The first line of defense, threat management, starts with the prevention of viruses and malware. An intelligent processor with embedded security technologies, like the 4th generation Intel® Core™ vPro™ processor, performs regular integrity checks on client system components, and actively prevent viruses and malware from entering your network.1,2
The next line of defense for identity and access, is about strengthening authentication and protecting passwords. Intel® Identity Protection Technology helps enterprise IT departments protect their access points while reducing costs over traditional hardware token or smartcard methods.3
The third IT security need, and arguably the most critical, is data protection. Intel® Secure Key provides highly secure keys4 for encrypting data.
This last line of defense extends across all aspects of IT security management. With remote support and monitoring capabilities embedded into the processor, your help desk staff can access and control the user's computer to resolve issues through all states, including reboot5.
* Other names and brands may be claimed as the property of others.