
Intel vPro® Technology
Intel vPro® Technology is a multi-layered hardware security and remote management solution that not only delivers out of the box protection against cyber-attacks but also empowers administrators to discover, diagnose, repair or retire PCs remotely even if the OS is down, or non-responsive or the system is powered off.
Intel vPro® Technology Consists of three pillars which include Intel Hardware Shield, Intel AMT (Active Management Technology), and Intel EMA (Endpoint Management Assist) each of which deliver a unique set of capabilities and business value.
Intel Hardware Shield is a set of technologies including Intel Threat Detection that provides out of the box security above and below the OS.
- Reduces the Attack Surface by 70%
- Provides Hardware Security Protections Right Out of the Box
- 97% Detection Against Known and Unknown Threats (SELabs)
Intel AMT allows remote management of the entire PC fleet, even if the OS is down or the system is powered off, to perform a host of functions including updating drivers, installing software, reimaging drives, updating patches, and more.
- vPro Systems can be deployed 30% faster
- Reduces Time Spent with Ongoing Endpoint Management of Systems by 65%
- 90% Reduction in Hardware Related Onsite Visits
- Results in 40% Less Hardware Support Tickets
Intel Endpoint Management Assist is a software agent that allows for the remote management of the Intel AMT device.
- Supports On-Prem, Hybrid, or Cloud Management of the PC
- Manage PCs Beyond the Corporate Firewall Over the Cloud and Through Known WiFi Networks and Connections
- Access Over the Cloud with AWS, Azure, or Google Cloud
The Secure PC, not the AI PC
While AI holds significant promise for future efficiencies, the larger more immediate business challenges are protecting systems from security threats and effectively managing remote end points.
Cyber Attacks
Security threats are increasing and becoming increasingly more advanced. Bloomberg estimates that if cybercrime were measured in GDP, it would represent the 3rd Largest Economy in the World.

Additionally, IDC reports that over 70% of all breaches began at the endpoint. These systems are more vulnerable to attack because workers PC provide access to the company network and are typically older so they lack many of the security capabilities available on newer PCs. Additionally, because the system are remote, they typically do not have the most updated corporate software security protocols updated.
SMBs Are at Risk
While we tend to assume that cyber criminals only attack large enterprises, they are just as likely to target an SMB since these companies also have personal information related to their clients.
of all attacks target the US
of all attacks target SMBs
of companies experience
multiple attacks
Intel Hardware Shield
Intel Hardware Shield is a set of security technologies built in to Intel vPro that provide above and below the OS protection against cyber attacks even those that target the OS, browsers, applications, firmware, BIOS, and system memory.
Below the OS Protection
Hardware that helps to create a small trust boundary to reduces the risk of flash-based attacks.
Hardware that helps to mitigate unauthorized BIOS boot block modifications.
A hardware-integrated credential storage and key management solution optimized for low power consumption.
Hardware helps PC manufacturers enforce a below-the-OS policy to reduce the risk of malware injection, making the platform more secure against attacks launched from System Management Mode (SMM).
Using this hardware-verified benchmark, helps a system quickly assess whether any attempts have been made to alter or tamper with the launch time environment.
Hardware extends enforcement of resource access policies for System Management Interface (SMI) handler firmware beyond memory resources to help reduce the attack surface in System Management Mode (SMM).
A patented, trusted hardware-to-software channel for gaining below-the-OS security visibility.
Supply-chain leadership enables IT to update the firmware on an end user’s system and also recover from a firmware failure—without user intervention.
Advanced Threat Protections
Helps identify polymorphic malware, file-less scripts, crypto mining and other targeted attacks – in real time, with minimal end user impact.
Intel integrated graphic technology GPU-enables offload compute-intensive AI algorithms and other security workloads to the Intel integrated GPU.
A highly effective, low-overhead tool that does not require intrusive scanning techniques or signature databases, leading to improved malware detection.
Monitors applications for early indicators of compromise. ABD leverages CPU execution control-flow tracking to build dynamic AI models of “good” application behavior.
Helps protect against the misuse of legitimate code through control-flow hijacking attacks.
Application and Data Protections
Helps prevent data exposure via “cold boot”/physical memory/DIMM removal attacks in the event of a stolen system.
Helps protect virtualized systems by enabling all activities to stay inside the VM, while reducing interrupt overhead and increasing I/O throughput.
Encrypt different types of DRAM traffic, helping isolate tasks, and improve overall security in a more efficient manner.
Extends hardware-rooted virtualization-based security to Intel vPro® PCs helping boost security for virtualized environments.
Hardware virtualization technology provides enhanced security by isolating different workspaces and reducing attack surfaces.
Helps protect secure workloads from unauthorized device Direct Memory Access (DMA) initiated from the main OS.
Only on Chrome Devices. Help protect AES keys by keeping the raw keys exposed for a minimal amount of time to reduce the chances they are compromised by rogue attackers.
Enables hypervisors to more reliably verify and enforce the integrity of kernel level code to help provide an extra layer of protection from malware attacks.
Helps reduce the risk of the risk of “drive-by” DMA attacks of hot plug PCIe ports such as Thunderbolt™ technology.
Gives IT environments faster, more affordable data protection and more security by accelerating data encryption.
