Intel vPro processor technology fortifies security
Intel further reinforced desktop PC security by unveiling the newest generation of Intel vPro processor technology for businesses and IT with new innovations that add better protection against hacking, viruses and other threats.
Intel vPro processor technology packages a new Intel Core 2 Duo processor, Intel Q35 Express chipset and several technology innovations offering a host of security and management capabilities for desktop PCs, including some that were previously impossible, such as the ability to wake and repair a computer with an inoperative operating system or hard drive. As a result, businesses can reduce costs by limiting expensive and time-consuming deskside visits, and by improving power savings through the ability to turn off PCs and securely wake them when required.
Security features included in this latest Intel vPro processor technology are designed to protect against software-based attacks and also filter and defend against viruses and other threats.
New in this product is Intel Trusted Execution Technology (TXT) which protects data within virtualized computing environments, an important feature as IT managers are considering the adoption of new virtualization-enabled computer uses. Used in conjunction with a new generation of the company’s virtualization technology – Intel Virtualization Technology for Directed I/O – Intel TXT ensures that virtual machine monitors are less vulnerable to attacks that cannot be detected by today’s conventional software-security solutions. By isolating assigned memory through this hardware-based protection, it keeps data in each virtual partition protected from unauthorized access from software in another partition.
In addition, Intel enhanced its Intel vPro processor technology with improved System Defense Filters. These filters can identify greater numbers and varieties of threats in the network traffic flow.
The latest version of Intel vPro processor technology also offers an embedded trust agent, the first certified by Cisco, providing the industry’s only 802.1x compatible manageability solution not dependent on OS-availability. This trust agent offers Cisco’s IT customers the ability to manage systems, even if powered off or the OS is down, without lowering the security on 802.1x networks and Cisco Self-Defending Network products.