White Paper: The All New 2010 Intel® Core™ vPro™ Processor Family: Intelligence that Adapts to Your Needs
The
•Transport Layer Security (TLS).
•HTTP authentication.
•
(Kerberos).
•Access control lists (ACLs).
•Digital firmware signing.
•Other advanced methodologies and technologies (refer to the
Intel® vPro™ Technology Expert Center at communities.intel.com/
The security measures built into laptop and desktop PCs with a new Intel Core vPro processor can be active even when the PC is off, software agents have been disabled, or the OS is unresponsive. These measures help ensure the security of stored information and the confidentiality and authentication of the communication channel and
Better protection through smarter security
Security remains one of the highest priorities for IT. The number of security incidents has grown dramatically each year and the nature of these threats has changed as the motivations of attackers have shifted from bragging rights to financial gain. The cost of a data breach is also rising. A recent survey of 43 companies in 2008 found that the average cost of a lost or stolen laptop is $49,000.22
The all new 2010 Intel Core vPro processor family can make it easier to protect data and assets. Once Intel vPro technology is activated, IT can take advantage of intelligent new security features, such as
•Push updates down the wire, regardless of PC power state.
–Remotely and securely power up PCs from the IT console to prepare them for patching.
–Automatically deploy more updates and critical patches
–Check a PC’s software version information, .DAT file information, and other data stored in nonvolatile memory, and find out if anything needs updating without waking up a PC.
–Reduce power consumption and lower energy bills by powering down PCs during
•Intel
•Programmable filtering of inbound and outbound network traffic.
•Isolation of systems that are suspected of being compromised – even if they are out of band or outside the corporate firewall.
•Agent presence checking, with continuous, intelligent polling for the presence of software agents, to help make sure security remains in place. IT can also use this capability to reduce unauthorized applica- tion usage by up to 100%.23
•Alerting from inside and outside the corporate network, such as for agent presence checking and inbound/outbound filtering of threats even if the OS is inoperable, software agents are missing, or a hard drive has failed or been removed.
•Dedicated memory, which better protects critical system information (such as
•Manageability of PCs with encrypted hard drives, to remotely unlock encrypted drives that require
or software agents are missing). Remotely manage data security settings even when PC is powered down.
•
802.1x, PXE, Cisco SDN*, and Microsoft NAP* environments.
•Hardware acceleration for
•Intel® Trusted Execution Technology19 (Intel® TXT), which uses
a
to a fully functional VMM. Intel TXT also protects secrets (security credentials) during power transitions. For more information about Intel TXT, visit www.intel.com/technology/security.
•
Note: IT can take advantage of
11