Intel® vPro™ Technology
Maximized, hardware-assisted security and manageability
Managing and protecting desktops and laptops and securing data are among the great challenges for modern businesses. The 2nd generation Intel® Core™ vPro™ processor family with the hardware-based security and manageability of Intel® vPro™ technology1 simplifies and accelerates these critical IT functions.
Manage the PC virtually anywhere, anytime
Intel® vPro™ technology is a set of security and manageability capabilities built into the 2nd generation Intel® Core™ vPro™ processor family, Intel® chipsets, and network adapters.
With security and management features built into the hardware, Intel® vPro™ technology:
- Accelerates data encryption/decryption using Intel® AES New Instructions2, improving user productivity. See how it works in this demo.
- Significantly reduces unwanted access to sensitive data on missing laptops using Intel® Anti-Theft Technology.3 See how it works in this demo.
- Allows IT technicians to quickly deploy security patches across PCs, remotely unlock encrypted drives, and manage data security settings
- Gives IT help desk personnel complete control over a PC with features like KVM Remote Control4
- Enables IT to remotely troubleshoot and repair PCs
Get connected with the Intel® vPro™ technology IT community and find out more at the Intel® vPro™ Expert Center.
See how Intel® vPro™ technology works in this demo.
Smart security and manageability on every chip
Embedded in hardware, Intel® vPro™ technology capabilities are accessed and administered separate from the hard drive, OS, and software applications – in a pre-boot environment. This makes management less susceptible to issues affecting these areas and allows remote access to the PC regardless of the system’s power state or OS condition. Key encryption components are kept in protected FLASH memory, separate from the data they protect, making it easier to secure and harder to penetrate and access sensitive information.
Read more about manageability in the Intel® vPro™ technology white paper.
Reduce cost, improve security and ROI
IT departments spend much of their time and budgets on PC patching, troubleshooting and repair, software inventories, and maintenance, preventing them from addressing key issues and initiatives that can help the business be more efficient and grow. With Intel® vPro™ technology, IT can:
- Reduce deskside visits by up to 56 percent5
- Improve laptop inventories by up to 47 percent5
- Accelerate patch saturation up to 56 percent faster5
The 2nd generation Intel® Core™ vPro™ processor family with Intel® Virtualization technology enables hardware-based virtualization for PCs for centralized image management and administration, secure network storage, and out-of-band protection – all beyond the firewall.
With more users going mobile, complying with security regulations is more critical – and difficult – than ever. Intel vPro technology, along with PC management software, simplifies, helps automate, and improves laptop security with hardware-embedded technologies and remote control and management.
1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.
2. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.
3. Intel® Anti-Theft Technology (Intel® AT). No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit www.intel.com/content/www/us/en/architecture-and-technology/anti-theft/anti-theft-general-technology.html.
4. KVM Remote Control (Keyboard Video Mouse) is only available with Intel® Core™ i5 vPro™ processors and Intel® Core™ i7 vPro™ processors with active processor graphics. Discrete graphics are not supported.
5. Results shown are from the 2007 EDS Case Studies with Intel® Centrino® Pro and the 2007 EDS case studies with Intel® vPro™ processor technology, by LeGrand and Salamasick., 3rd party audit commissioned by Intel, of various enterprise IT environments and the 2007 Benefits of Intel® Centrino® Pro Processor Technology in the Enterprise, Wipro Technologies study commissioned by Intel. The EDS studies compare test environments of Intel® Centrino® Pro and Intel vPro processor technology equipped PCs vs. non-Intel vPro processor technology environments. Tested PCs were in multiple OS and power states to mirror a typical working environment. The Wipro study models projected ROI of deploying Intel Centrino Pro processor technology. Actual results may vary and may not be representative of the results that can be expected for smaller businesses. The study is available at www.intel.com/content/www/us/en/processors/vpro/core-processors-with-vpro-technology.html, www.eds.com and www.wipro.com.