{"id":8879,"date":"2024-07-17T15:38:10","date_gmt":"2024-07-17T15:38:10","guid":{"rendered":"https:\/\/www.asipartner.com\/canada\/?page_id=8879"},"modified":"2024-07-17T15:51:35","modified_gmt":"2024-07-17T15:51:35","slug":"endpoint-protection-with-intel-vpro","status":"publish","type":"page","link":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/","title":{"rendered":"Endpoint Protection with Intel vPro"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"300\" alt=\"Endpoint Protection with Intel vPro\" src=\"https:\/\/www.asipartner.com\/canada\/wp-content\/uploads\/2024\/07\/EndpointProtectionSolutionsBannerv2.jpg\" class=\"img-responsive wp-image-11545\"\/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><h3>Endpoint Protection with Intel vPro\u00ae<br \/>\nand Intel\u00ae Core\u2122 Ultra<\/h3>\n<p>IDC reports that 70% of all successful security breaches began at the endpoint and SMBs are not immune to these cyber threats, making it imperative that resellers provide their clients with PCs that deliver the highest levels of protection. With nearly two decades of experience developing hardware-based security and manageability features, Intel vPro\u00ae delivers industry-leading endpoint protection that is unsurpassed by any other CPU manufacturer.<\/p>\n<h3>The Risk to SMBs<\/h3>\n<p>According to studies cited by WebFX, over half of the world-wide cyberattacks occur in the US, and SMBs are just as vulnerable as large enterprises, if not more, as they tend to have fewer security protocols, are unaware of solutions available to protect their computers, and leverage endpoint systems that are much older, making them more susceptible to attack. With the continuation of the remote workforce, managing and securing the companies endpoints is increasingly critical.<\/p>\n<\/div><div class=\"fusion-counters-box counters-box row fusion-clearfix fusion-columns-3\" style=\"--awb-body-color:#141617;--awb-body-size:15;--awb-border-color:rgba(244,216,78,0);--awb-color:#014d78;--awb-title-size:61;--awb-icon-size:52;--awb-border-color:rgba(244,216,78,0);\"><div class=\"fusion-counter-box fusion-column col-counter-box counter-box-wrapper col-lg-4 col-md-4 col-sm-4\" data-animationOffset=\"top-into-view\"><div class=\"counter-box-container\"><div class=\"content-box-percentage content-box-counter\"><span class=\"display-counter\" data-value=\"44\" data-direction=\"up\" data-decimals=\"0\">0<\/span><span class=\"unit\">%<\/span><\/div><div class=\"counter-box-content\">of all SMBs experienced a Cyberattack<\/div><\/div><\/div><div class=\"fusion-counter-box fusion-column col-counter-box counter-box-wrapper col-lg-4 col-md-4 col-sm-4\" data-animationOffset=\"top-into-view\"><div class=\"counter-box-container\"><div class=\"content-box-percentage content-box-counter\"><span class=\"display-counter\" data-value=\"87\" data-direction=\"up\" data-decimals=\"0\">0<\/span><span class=\"unit\">%<\/span><\/div><div class=\"counter-box-content\">of companies get attacked more than once<\/div><\/div><\/div><div class=\"fusion-counter-box fusion-column col-counter-box counter-box-wrapper col-lg-4 col-md-4 col-sm-4\" data-animationOffset=\"top-into-view\"><div class=\"counter-box-container\"><div class=\"content-box-percentage content-box-counter\"><span class=\"display-counter\" data-value=\"45\" data-direction=\"up\" data-decimals=\"0\">0<\/span><span class=\"unit\">%<\/span><\/div><div class=\"counter-box-content\">increase in ransomware attacks since 2014 <\/div><\/div><\/div><\/div><div class=\"fusion-counters-box counters-box row fusion-clearfix fusion-columns-3\" style=\"--awb-body-color:#141617;--awb-body-size:15;--awb-border-color:rgba(244,216,78,0);--awb-color:#014d78;--awb-title-size:61;--awb-icon-size:52;--awb-border-color:rgba(244,216,78,0);\"><div class=\"fusion-counter-box fusion-column col-counter-box counter-box-wrapper col-lg-4 col-md-4 col-sm-4\" data-animationOffset=\"top-into-view\"><div class=\"counter-box-container\"><div class=\"content-box-percentage content-box-counter\"><span class=\"display-counter\" data-value=\"61\" data-direction=\"up\" data-decimals=\"0\">0<\/span><span class=\"unit\">%<\/span><\/div><div class=\"counter-box-content\">of all cyberattacks target the US<\/div><\/div><\/div><div class=\"fusion-counter-box fusion-column col-counter-box counter-box-wrapper col-lg-4 col-md-4 col-sm-4\" data-animationOffset=\"top-into-view\"><div class=\"counter-box-container\"><div class=\"content-box-percentage content-box-counter\"><span class=\"display-counter\" data-value=\"82\" data-direction=\"up\" data-decimals=\"0\">0<\/span><span class=\"unit\">%<\/span><\/div><div class=\"counter-box-content\">of ransomware attacks were against companies with less than 1,000 employees<\/div><\/div><\/div><div class=\"fusion-counter-box fusion-column col-counter-box counter-box-wrapper col-lg-4 col-md-4 col-sm-4\" data-animationOffset=\"top-into-view\"><div class=\"counter-box-container\"><div class=\"content-box-percentage content-box-counter\"><span class=\"display-counter\" data-value=\"60\" data-direction=\"up\" data-decimals=\"0\">0<\/span><span class=\"unit\">%<\/span><\/div><div class=\"counter-box-content\">of small businesses that suffer a cyberattack go out of business within 6 months of the attack<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-with-title content-left\" style=\"--awb-margin-bottom:0px;--awb-hover-accent-color:#00b4d8;--awb-circle-hover-accent-color:#00b4d8;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#f5f5f5;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:42px;width:42px;line-height:22px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:#212934;box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:#212934;border-width:1px;background-color:#212934;box-sizing:content-box;height:40px;width:40px;line-height:40px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:20px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-book-reader fas circle-yes\"><\/i><\/span><\/div><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Resources<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<ul>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/business\/enterprise-computers\/resources\/vpro-endpoint-management-from-the-cloud-ebook.html\" target=\"_blank\" rel=\"noopener\">Ebook: Manage Devices from the Cloud with Intel vPro\u00ae Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/07\/Intel-vPro\u00ae-Small-Business-Pillar-Values-UAM-778915-1.pdf\">Intel vPro\u00ae Benefits for Small Business<\/a><\/li>\n<li><a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/vpro\/hardware-shield\/threat-detection-technology.html\" target=\"_blank\" rel=\"noopener\">Intel\u00ae Threat Detection Technology<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/07\/2024-Ransomware-and-Intel-Threat-Detection-Technology-Report.pdf\" target=\"_blank\" rel=\"noopener\">Whitepaper: SE Labs Intel Threat Detection Technology Report<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/07\/2024-Intel-AMD-Security-Comparison.pdf\" target=\"_blank\" rel=\"noopener\">Whitepaper: IOActive Research Cross-Platform Feature Comparison<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/07\/2024-Fortinet-WFA-Security.pdf\" target=\"_blank\" rel=\"noopener\">Fortinet Security Solutions Brief<\/a><\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-text-transform:none;\"><h3 style=\"text-align: left\">Intel vPro\u00ae Security and Manageability Features<\/h3>\n<p><span style=\"color: #0861a1\"><strong>Click on the circles below to learn more about each feature.<\/strong><\/span><\/p>\n<\/div>\n<style>\n\t#hotspot-8883 .hotspots-image-container,\n\t#hotspot-8883 .leaflet-container {\n\t\tbackground: #ffffff\t}\n\n\t#hotspot-8883 .hotspots-placeholder,\n\t.featherlight .featherlight-content.lightbox-8883 {\n\t\tbackground: #ffffff;\n\t\tborder: 0 #ffffff solid;\n\t\tcolor: #000000;\n\t}\n\n\t#hotspot-8883 .hotspot-title,\n\t#hotspot-8883 .bc-product__title a,\n\t.featherlight .featherlight-content.lightbox-8883 .hotspot-title,\n\t.featherlight .featherlight-content.lightbox-8883 .bc-product__title a {\n\t\tcolor: #1e73be;\n\t}\n\n\t\t\t#hotspot-8883 .hotspot-style-1 {\n\t\t\tstroke-width: 2;\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0.81;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0.01;\n\t\t}\n\t\t#hotspot-8883 .hotspot-style-1:hover,\n\t\t#hotspot-8883 .hotspot-style-1:focus-visible,\n\t\t#hotspot-8883 .hotspot-style-1.hotspot-active {\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0.81;\n\t\t\toutline: none;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0.01;\n\t\t}\n\t\t\t#hotspot-8883 .hotspot-default {\n\t\t\tstroke-width: 2;\n\t\t\tfill: #ffffff;\n\t\t\tfill-opacity: 0.01;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0.01;\n\t\t}\n\t\t#hotspot-8883 .hotspot-default:hover,\n\t\t#hotspot-8883 .hotspot-default:focus-visible,\n\t\t#hotspot-8883 .hotspot-default.hotspot-active {\n\t\t\tfill: #1e73be;\n\t\t\tfill-opacity: 0.51;\n\t\t\toutline: none;\n\t\t\tstroke: #ffffff;\n\t\t\tstroke-opacity: 0.01;\n\t\t}\n\t\t#hotspot-8883 .leaflet-tooltip,\n\t#hotspot-8883 .leaflet-rrose-content-wrapper {\n\t\tbackground: #ffffff;\n\t\tborder-color: #ffffff;\n\t\tcolor: #000000;\n\t}\n\n\t#hotspot-8883 a.leaflet-rrose-close-button {\n\t\tcolor: #1e73be;\n\t}\n\n\t#hotspot-8883 .leaflet-rrose-tip {\n\t\tbackground: #ffffff;\n\t}\n\n\t#hotspot-8883 .leaflet-popup-scrolled {\n\t\tborder-bottom-color: #000000;\n\t\tborder-top-color: #000000;\n\t}\n\n\t#hotspot-8883 .leaflet-tooltip-top:before {\n\t\tborder-top-color: #ffffff;\n\t}\n\n\t#hotspot-8883 .leaflet-tooltip-bottom:before {\n\t\tborder-bottom-color: #ffffff;\n\t}\n\t#hotspot-8883 .leaflet-tooltip-left:before {\n\t\tborder-left-color: #ffffff;\n\t}\n\t#hotspot-8883 .leaflet-tooltip-right:before {\n\t\tborder-right-color: #ffffff;\n\t}\n<\/style>\n\n\n\t<div class=\"hotspots-container  layout-tooltip event-click\" id=\"hotspot-8883\" data-layout=\"tooltip\" data-trigger=\"click\">\n\t\t<div class=\"hotspots-interaction\">\n\t\t\t<div class=\"hotspots-image-container\">\n\t<img\n\t\twidth=\"800\"\n\t\theight=\"800\"\n\t\tsrc=\"https:\/\/www.asipartner.com\/canada\/wp-content\/uploads\/sites\/2\/2024\/07\/vProEndpointProtectionClickImage.jpg\"\n\t\talt=\"Intel vPro Endpoint Protection\"\n\t\tclass=\"hotspots-image skip-lazy\"\n\t\tusemap=\"#hotspots-image-8883\"\n\t\tdata-image-title=\"Intel vPro Endpoint Protection\"\n\t\tdata-image-description=\"\"\n\t\tdata-event-trigger=\"click\"\n\t\tdata-always-visible=\"on\"\n\t\tdata-id=\"8883\"\n\t\tdata-no-lazy=\"1\"\n\t\tdata-lazy-src=\"\"\n\t\tdata-lazy=\"false\"\n\t\tloading=\"eager\"\n\t\tdata-skip-lazy=\"1\"\n\t\t>\n<\/div>\t\t<\/div>\n\t\t<map name=\"hotspots-image-8883\" class=\"hotspots-map\">\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"401,113,81\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-0\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel Threat Detection Technology\"\n\t\t\t\t\talt=\"Intel Threat Detection Technology\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-0\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"597,182,76\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-1\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel Hardware Shield\"\n\t\t\t\t\talt=\"Intel Hardware Shield\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-1\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"699,363,80\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-2\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel Total Memory Encryption\"\n\t\t\t\t\talt=\"Intel Total Memory Encryption\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-2\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"659,563,77\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-3\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel Key Locker\"\n\t\t\t\t\talt=\"Intel Key Locker\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-3\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"504,696,79\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-4\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel Platform Trust Technology\"\n\t\t\t\t\talt=\"Intel Platform Trust Technology\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-4\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"301,693,80\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-5\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel Control Flow Enforcement\"\n\t\t\t\t\talt=\"Intel Control Flow Enforcement\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-5\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"144,562,78\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-6\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel VT-x\"\n\t\t\t\t\talt=\"Intel VT-x\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-6\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"103,360,86\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-7\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel AMT Active Management Technology\"\n\t\t\t\t\talt=\"Intel AMT Active Management Technology\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-7\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t<area\n\t\t\t\t\tshape=\"circle\"\n\t\t\t\t\tcoords=\"211,187,86\"\n\t\t\t\t\thref=\"#hotspot-hotspot-8883-8\"\n\t\t\t\t\trel=\"\"\n\t\t\t\t\ttitle=\"Intel EMA Endpoint Management Assistant\"\n\t\t\t\t\talt=\"Intel EMA Endpoint Management Assistant\"\n\t\t\t\t\tdata-action=\"\"\n\t\t\t\t\tdata-color-scheme=\"\"\n\t\t\t\t\tdata-id=\"area-hotspot-8883-8\"\n\t\t\t\t\ttarget=\"\"\n\t\t\t\t\tclass=\"more-info-area\"\n\t\t\t\t\t>\n\t\t\t\t\t<\/map>\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-0\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel Threat Detection Technology<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>A feature within Intel Hardware Shield, Intel\u00ae TDT uses CPU telemetry and Machine Learning to profile and detect malware, ransomware and cryptojacking, improving monitoring and security performance at the hardware level. In a recent study, Intel\u00ae TDT detected 93 percent of top ransomware variants from the silicon sensor, bolstering the EDR\u2019s overall detection efficacy by 24% over software alone.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-1\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel Hardware Shield<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>A suite of security technologies that help provide full stack protections at the hardware level including BIOS\/firmware, hypervisor, VMs, OS, and applications.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-2\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel Total Memory Encryption<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Hardware-based security that encrypts DRAM to help protect against a physical cold boot attack. Additionally, Multi-key can encrypt sections of DRAM as directed by OS.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-3\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel Key Locker<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Protects keys used by AES-NI encryption. Provides protected storage for encryption keys, a key step in bolstering overall security.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-4\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel Platform Trust Technology<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Integrated Trusted Platform Module within Intel SOCs, supporting TPM 2.0 and Intel\u00ae TXT.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-5\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel Control Flow Enforcement<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Hardware-enhanced protection against memory safety attacks common to connected apps such as browsers, meeting tools, etc.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-6\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel VT-x<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Enables a variety of OS security services including Virtualization-Based Security on Windows systems.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-7\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel AMT Active Management Technology<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Intel\u00ae Active Management Technology is a hardware based solution that provides out-of-band connectivity that operates independently of the OS, allowing fixes to a wide range of systems issues, even when the OS is down or the system is powered off. IT can repair corrupted drivers, application software, or the OS on non-responsive systems that will not run or boot, or use remote KVM4 to monitor OS upgrades or restart to the system BIOS.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t<div class=\"hotspot-info \" id=\"hotspot-hotspot-8883-8\">\n\t\t\t\t\n\t\t\t\t<h2 class=\"hotspot-title\">Intel EMA Endpoint Management Assistant<\/h2>\t\t\t\t\t\t\t\t<div class=\"hotspot-content\">\n\t\t\t\t\t<p>Intel\u00ae EMA software allows IT to remotely and securely manage Intel AMT-enabled devices beyond the firewall via the cloud on known Wi-Fi networks.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\n<\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":3459,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-8879","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Endpoint Protection with Intel vPro - ASI Canada<\/title>\n<meta name=\"description\" content=\"Endpoint Protection with Intel vPro\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint Protection with Intel vPro\" \/>\n<meta property=\"og:description\" content=\"Endpoint Protection with Intel vPro\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/\" \/>\n<meta property=\"og:site_name\" content=\"ASI Canada\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-17T15:51:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/\",\"url\":\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/\",\"name\":\"Endpoint Protection with Intel vPro - ASI Canada\",\"isPartOf\":{\"@id\":\"https:\/\/www.asipartner.com\/canada\/#website\"},\"datePublished\":\"2024-07-17T15:38:10+00:00\",\"dateModified\":\"2024-07-17T15:51:35+00:00\",\"description\":\"Endpoint Protection with Intel vPro\",\"breadcrumb\":{\"@id\":\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.asipartner.com\/canada\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint Protection with Intel vPro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.asipartner.com\/canada\/#website\",\"url\":\"https:\/\/www.asipartner.com\/canada\/\",\"name\":\"ASI Canada\",\"description\":\"Just another ASI Partner Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.asipartner.com\/canada\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Endpoint Protection with Intel vPro - ASI Canada","description":"Endpoint Protection with Intel vPro","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/","og_locale":"en_US","og_type":"article","og_title":"Endpoint Protection with Intel vPro","og_description":"Endpoint Protection with Intel vPro","og_url":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/","og_site_name":"ASI Canada","article_modified_time":"2024-07-17T15:51:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/","url":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/","name":"Endpoint Protection with Intel vPro - ASI Canada","isPartOf":{"@id":"https:\/\/www.asipartner.com\/canada\/#website"},"datePublished":"2024-07-17T15:38:10+00:00","dateModified":"2024-07-17T15:51:35+00:00","description":"Endpoint Protection with Intel vPro","breadcrumb":{"@id":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.asipartner.com\/canada\/solutions\/endpoint-protection-with-intel-vpro\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.asipartner.com\/canada\/solutions\/"},{"@type":"ListItem","position":2,"name":"Endpoint Protection with Intel vPro"}]},{"@type":"WebSite","@id":"https:\/\/www.asipartner.com\/canada\/#website","url":"https:\/\/www.asipartner.com\/canada\/","name":"ASI Canada","description":"Just another ASI Partner Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.asipartner.com\/canada\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"}]}},"_links":{"self":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/8879","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/comments?post=8879"}],"version-history":[{"count":3,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/8879\/revisions"}],"predecessor-version":[{"id":8885,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/8879\/revisions\/8885"}],"up":[{"embeddable":true,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/3459"}],"wp:attachment":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/media?parent=8879"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}