Maaf, PDF ini hanya tersedia dalam format unduhan

Intel IT Center Real-World Guide to 3rd Generation Intel Core vPro Processors

Why You Should Read This Document

This guide explains how the built-in security of the 3rd Generation Intel® Core™ vPro™ processor provides the additional layer of protection IT managers need to address the four pillars of IT security:
• Preventing viruses and malware through threat management, including rootkits and escalation-of-privilege attacks
• Strengthening authentication and protecting passwords through stronger identity and access security
• Improving data protection through faster encryption of sensitive business data and online transactions, and mitigating the risk of lost or stolen PCs
• Extending monitoring and remediation capabilities with powerful remote support, regardless of the operational state of the PC

Video Terkait