A New Level of Built-in PC Security

Intel® Hardware Shield, now available on the 11th Gen Intel vPro® mobile platform, provides the highest performance and most comprehensive hardware-based security for business.1 2

Businesses face increasing numbers, types, complexity, and severity of cyberattacks. Intel® Hardware Shield, exclusive to the Intel vPro® platform, helps protect and defend against modern threats with defense in depth at each layer: hardware, BIOS/firmware, hypervisor, VMs, OS and applications.

Below-the-OS Security from Attacks at the Firmware and Hardware Levels

A Windows 10 Enterprise-based Intel vPro platform offers the unique capabilities of Intel Hardware Shield built-in to deliver the highest level of hardware, software and data protection right out of the box.

  • Minimize the risk of malicious code injection by using Intel Hardware Shield to lock down memory in the BIOS when software is running and help prevent planted malware from compromising the OS.
  • Help ensure your OS boots securely with Intel Hardware Shield that offers many hardware-based security capabilities that support a secure boot, allowing your PCs to launch into a trusted state.

Extend Protections of Your Applications and Data with Hardware-Accelerated Virtualization and Encryption

Enable hardware-based virtualization to help protect user access credentials, workspaces, applications and data in hardened enclaves.

  • Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel Hardware Shield.
  • Accelerate virtualized security software like Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel-level malware and browser-based attacks.
  • Complement virtualization with hardware-based encryption to help protect data at every layer.

Help Detect and Respond to Advanced Threats

Mitigate extreme attacks like control-flow hijacking, ransomware, and crypto mining.

  • Software developers like Microsoft use Intel® Control-Flow Enforcement Technology (Intel® CET), part of Intel Hardware Shield, to help defend against attacks on system memory.
  • Defend against ransomware and malicious crypto mining with Intel® Threat Detection Technology (Intel® TDT), part of Intel Hardware Shield. Hardware-based threat detection to detect the latest threats such as crypto mining and ransomware without an impact on performance.

Built for Business Innovation

Transform computing endpoints into strategic corporate assets by selecting devices built on the Intel vPro® platform.


Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.

Informasi Produk dan Performa


Dalam perangkat tipis dan ringan berbasis Windows, sebagaimana diukur menurut pengujian per 1 Desember 2020 pada Intel® Core™ i7-1185G7 berdasarkan benchmark industri, pengujian Panduan Penggunaan Representatif, dan fitur unik, termasuk perbandingan dengan AMD Ryzen 7 Pro 4750U, dalam 3 penggunaan utama: produktivitas, pembuatan konten, dan kolaborasi, serta studi IOActive pada bulan Desember 2020 (ditugaskan oleh Intel) membandingkan kemampuan keamanan Intel® Hardware Shield dengan teknologi yang terkait dalam AMD Ryzen Pro 4750U.


Untuk beban kerja dan konfigurasi kunjungi www.Intel.com/PerformanceIndex. Hasil dapat berbeda.