Why You Should Read This Document
This guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:
• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks
• Strengthening authentication and protecting passwords through stronger identity and access security
• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs
• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC
McAfee and Intel integrated security solutions combine McAfee's leading security software with the security and remediation of Intel® Core™ vPro™.
Animation on McAfee ePO Deep Command*.
Video from IT@Intel discusses the isolation of infected PCs and remediation with Intel® vPro™ Technology.
Hear how 3rd generation Intel® Core™ vPro™ processors deliver intelligent performance with embedded security and helps CompuCom reduce customers’ costs while increasing security and productivity.
Multi-level security with Intel® Anti-Theft Technology in laptops with Intel® Core™ vPro™ technology
Jim Greene talks about trusted compute pools, secure on-boarding of virtual machines and auditing of the security posture in your cloud environment.