
White Paper: The All New 2010 Intel® Core™ vPro™ Processor Family: Intelligence that Adapts to Your Needs
Advanced layers of defense for PCs with a new Intel® Core™ vPro™ processor
Wired or wireless user OS/environment
1
2
3
4
5
6
Support for 802.1x, Cisco NAC,* and Microsoft NAP*
to enable remote
Programmable filters
examine network traffic and
Visibility of
through
to make sure security agents and other critical applications stay active.
Persistent, protected memory
helps prevent unauthorized access to critical system information.
Intelligent protection from loss or theft by disabling the PC and/or data
through local timer expiry, excessive login attempts, and/or "poison pill" responses, including through virtually instant remote notification via a 3G modem if a suspected theft is in progress.
of memory and processor resources for PCs, and Intel® TXT helps create secure virtual environments.
Figure 3. New layers of defense.
These new layers of defense make it easier to identify attacks faster on both wired and wireless systems, and stop them more effectively before they begin to spread.
Intel®One of the new features in PCs with a new 2010 Intel Core vPro processor is Intel
Poison pill responses can be:
•Local and
•Remote and administered by IT, based on an alert or upon receiving a call from the user (for example, that the laptop was lost while traveling).
IT can use flexible policies to specify that the poison pill:
•Disable access to encrypted data by deleting encryption key compo- nents or other cryptographic credentials required for access to data.
•Disable the PC so it cannot boot the OS, even if the hard drive is replaced or reformatted.
•Disable both the PC and access to encrypted data. IT can use the
For example, IT could define a trigger for critical machines, such as a financial officer’s laptop, so that if the system does not connect to the central server every day, access to the system is disabled. If the laptop is reported lost, an IT administrator can flag the system in a central data- base. The next time the laptop connects to the Internet, it calls home using
Easy reactivation and full system recovery
Reactivation from a
•Local
12