Intel’s investment in Intel® vPro™ technology is entering its tenth anniversary, and it exemplifies Intel’s commitment to engineering innovations for business computing. The benefits, capabilities, and features of our new 5th generation Intel® Core™ vPro™ processor and Intel® Core™ M vPro™ processor help IT leadership ensure that their workplace can keep up with the workforce demands. In addition, Intel vPro technology and accompanying solutions from Intel and our partners help businesses remain relevant and desired in a competitive market.
Ultra thin, ultra fast designs are available with amazing new 14 nm processors and Intel vPro technology. Tablets, Ultrabook™ devices, convertible and detachable 2 in 1s, ultra-thin clamshells, and mini PCs feature built-in security, manageability, and wireless innovations to help transform the workplace.
Intel® Pro Wireless Display securely and wirelessly connects your screen to a project while providing a privacy screen to prevent unintended sharing, controls for group presentations, and an indicator to know when you’re sharing. IT departments get corporate network security, remote manageability for client and receiver settings, and decreased wireless congestion with intelligent channel management.
Be connected and ready the moment you walk up to your desk with Intel® Wireless Docking. This technology delivers proximity-based automatic docking with wire-like performance for display, keyboard and mouse, and USB accessories, lossless display and user experience, and IT controls for remote dock management.
The Intel® Solid-State Drive Pro 2500 Series delivers integrated full-disk encryption capability without sacrificing data productivity and performance, support for Opal* 2.0 for future usages like Secure Managed Containers and Digital Fencing, and secure erase command for user data, SSD reserved data, and retired block areas.
Intel® Active Management Technology provides remote management over wired or wireless networks across devices. Access clients through a secure channel irrespective of power or OS state, address issues while user is online, patch, repair, and upgrade operating systems and applications, and inventory client-side software and hardware.
Identity, protected. Help safeguard usernames and passwords with built-in hardware-strength benefits. Intel® Identity Protection Technology delivers authentication with added hardware-based protection, malware screen scraping protection plus presence proof, and strong mutual authentication plus data integrity.
Today’s businesses face several IT challenges to find devices that fit the productivity and collaboration needs of business users while defending devices and personal and business data from threats.
Intel® vPro™ technology addresses each of these needs through its comprehensive set of security, manageability, and productivity-enhancing capabilities. This technology is built into the new Intel® Core™ vPro™ processor family, the Intel® Xeon® processor E5-2600, E5-1600, and E3-1200 product families, Intel® chipsets, and network adapters that solve these critical IT challenges.1,2
While Intel vPro technology is conveniently built in, some of its unique features require action to deploy them based on the organization’s needs and policies. Thanks to Intel® Setup and Configuration Software 9.0, IT managers can implement Intel vPro processor–based devices in a matter of minutes.2
Intel® vPro™ technology protects against difficult-to-detect, penetrating rootkits and malware that threaten users working in cloud or virtual environments. It combines several hardware-based features for centralized image management and administration, secure network storage, and out-of-band protection—all beyond the firewall.
Trusted compute pools with Intel® Trusted Execution Technology (Intel® TXT)3 help protect virtualized data centers’ private, public, and hybrid clouds against attacks on hypervisor and BIOS, firmware, and other software components.
Intel® Virtualization Technology (Intel® VT)4 represents a growing portfolio of technologies and features which make virtualization practical by eliminating performance overheads and improving security.
Intel® AES New Instructions5 provides additional protection and can encrypt data up to four times faster without interfering with user productivity.6
Intel® vPro™ technology features, such as Intel® Active Management Technology, enable banks to quickly troubleshoot and repair an ATM remotely, thereby increasing its availability. Meanwhile, Intel® VT can improve reliability by allowing the bank transaction application to run safely in isolation of non-critical applications, such as advertising videos. Finally, Intel® TXT protects the ATM by preventing unauthorized software—which may have been inadvertently loaded onto the system—from starting up.
No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details. For more information, see http://www.intel.com/content/www/us/en/security/security-at-home.html.
Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.
Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at www.intel.com/txt.
Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assist-virtualization-technology.html.
Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance.
Results have been measured by Intel based on software, benchmark or other data of third parties and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. Intel does not control or audit the design or implementation of third party data referenced in this document. Intel encourages all of its customers to visit the websites of the referenced third parties or other sources to confirm whether the referenced data is accurate and reflects performance of systems available for purchase.
No system can provide absolute security. Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as software to execute the instructions in the correct sequence. Intel® Secure Key requires an Intel® Secure Key-enabled platform, available on select Intel® processors, and software optimized to support Intel® Secure Key. Consult your system manufacturer for more information and availability.