{"id":9046,"date":"2024-11-20T15:39:30","date_gmt":"2024-11-20T15:39:30","guid":{"rendered":"https:\/\/www.asipartner.com\/canada\/?page_id=9046"},"modified":"2025-04-22T13:32:30","modified_gmt":"2025-04-22T13:32:30","slug":"intel-vpro-technology","status":"publish","type":"page","link":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/","title":{"rendered":"Intel vPro Technology"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1200\" height=\"330\" alt=\"Intel vPro\" src=\"https:\/\/www.asipartner.com\/canada\/wp-content\/uploads\/2024\/11\/IntelvProMainBannerv2.jpg\" class=\"img-responsive wp-image-12099\"\/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_4 3_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:75%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.56%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.56%;--awb-width-medium:75%;--awb-order-medium:0;--awb-spacing-right-medium:2.56%;--awb-spacing-left-medium:2.56%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><h4>Intel vPro\u00ae Technology<\/h4>\n<p>Intel vPro\u00ae Technology is a multi-layered hardware security and remote management solution that not only delivers out of the box protection against cyber-attacks but also empowers administrators to discover, diagnose, repair or retire PCs remotely even if the OS is down, or non-responsive or the system is powered off.<\/p>\n<p>Intel vPro\u00ae Technology Consists of three pillars which include Intel Hardware Shield, Intel AMT (Active Management Technology), and Intel EMA (Endpoint Management Assist) each of which deliver a unique set of capabilities and business value.<\/p>\n<\/div><div class=\"fusion-tabs fusion-tabs-1 classic nav-is-justified horizontal-tabs icon-position-top mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-title-font-size:20px;--awb-alignment:start;--awb-inactive-color:#f9f9fb;--awb-background-color:#ffffff;--awb-border-color:#e2e2e2;--awb-active-border-color:#0076a4;\"><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-8955bfd301381e72b2c\" aria-selected=\"true\" id=\"fusion-tab-multilayeredsecuritywithintelhardwareshield\" href=\"#tab-8955bfd301381e72b2c\"><h5 class=\"fusion-tab-heading\"><i class=\"fontawesome-icon fa-shield-alt fas\" aria-hidden=\"true\" style=\"font-size:30px;\"><\/i>Multi Layered Security with Intel Hardware Shield<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-97ee544eef224730704\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-remotemanagementwithintelamt\" href=\"#tab-97ee544eef224730704\"><h5 class=\"fusion-tab-heading\"><i class=\"fontawesome-icon fa-cog fas\" aria-hidden=\"true\" style=\"font-size:30px;\"><\/i>Remote Management with Intel AMT<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-6f6202441f84338b9c9\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-remoteaccesswithintelemt\" href=\"#tab-6f6202441f84338b9c9\"><h5 class=\"fusion-tab-heading\"><i class=\"fontawesome-icon fa-check-circle fas\" aria-hidden=\"true\" style=\"font-size:30px;\"><\/i>Remote Access with Intel EMT<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-8955bfd301381e72b2c\" aria-selected=\"true\" id=\"mobile-fusion-tab-multilayeredsecuritywithintelhardwareshield\" href=\"#tab-8955bfd301381e72b2c\"><h5 class=\"fusion-tab-heading\"><i class=\"fontawesome-icon fa-shield-alt fas\" aria-hidden=\"true\" style=\"font-size:30px;\"><\/i>Multi Layered Security with Intel Hardware Shield<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-multilayeredsecuritywithintelhardwareshield\" id=\"tab-8955bfd301381e72b2c\">\n<p><strong>Intel Hardware Shield is a set of technologies including Intel Threat Detection that provides out of the box security above and below the OS.<\/strong><\/p>\n<ul>\n<li>Reduces the Attack Surface by 70%<\/li>\n<li>Provides Hardware Security Protections Right Out of the Box<\/li>\n<li>97% Detection Against Known and Unknown Threats (SELabs)<\/li>\n<\/ul>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-97ee544eef224730704\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-remotemanagementwithintelamt\" href=\"#tab-97ee544eef224730704\"><h5 class=\"fusion-tab-heading\"><i class=\"fontawesome-icon fa-cog fas\" aria-hidden=\"true\" style=\"font-size:30px;\"><\/i>Remote Management with Intel AMT<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-remotemanagementwithintelamt\" id=\"tab-97ee544eef224730704\">\n<p><strong>Intel AMT allows remote management of the entire PC fleet, even if the OS is down or the system is powered off, to perform a host of functions including updating drivers, installing software, reimaging drives, updating patches, and more.<\/strong><\/p>\n<ul>\n<li>vPro Systems can be deployed 30% faster<\/li>\n<li>Reduces Time Spent with Ongoing Endpoint Management of Systems by 65%<\/li>\n<li>90% Reduction in Hardware Related Onsite Visits<\/li>\n<li>Results in 40% Less Hardware Support Tickets<\/li>\n<\/ul>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-6f6202441f84338b9c9\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-remoteaccesswithintelemt\" href=\"#tab-6f6202441f84338b9c9\"><h5 class=\"fusion-tab-heading\"><i class=\"fontawesome-icon fa-check-circle fas\" aria-hidden=\"true\" style=\"font-size:30px;\"><\/i>Remote Access with Intel EMT<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-remoteaccesswithintelemt\" id=\"tab-6f6202441f84338b9c9\">\n<p><strong>Intel Endpoint Management Assist is a software agent that allows for the remote management of the Intel AMT device.<\/strong><\/p>\n<ul>\n<li>Supports On-Prem, Hybrid, or Cloud Management of the PC<\/li>\n<li>Manage PCs Beyond the Corporate Firewall Over the Cloud and Through Known WiFi Networks and Connections<\/li>\n<li>Access Over the Cloud with AWS, Azure, or Google Cloud<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-text fusion-text-2\"><h4>The Secure PC, not the AI PC<\/h4>\n<p>While AI holds significant promise for future efficiencies, the larger more immediate business challenges are protecting systems from security threats and effectively managing remote end points.<\/p>\n<h4>Cyber Attacks<\/h4>\n<p>Security threats are increasing and becoming increasingly more advanced. Bloomberg estimates that if cybercrime were measured in GDP, it would represent the 3<sup>rd<\/sup> Largest Economy in the World.<\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-max-width:650px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"1104\" height=\"720\" alt=\"Intel vPro GDP Cybercrime\" src=\"https:\/\/www.asipartner.com\/canada\/wp-content\/uploads\/2024\/11\/IntelvProGDPCybercrime.jpg\" class=\"img-responsive wp-image-12102\"\/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:30px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-1 fusion-content-boxes-1 content-boxes-icon-with-title content-left\" style=\"--awb-hover-accent-color:#00b4d8;--awb-circle-hover-accent-color:#00b4d8;--awb-item-margin-bottom:40px;\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:#f5f5f5;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper-background link-area-link-icon content-icon-wrapper-yes icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><span style=\"height:42px;width:42px;line-height:22px;border-color:rgba(255,255,255,0);border-width:1px;border-style:solid;background-color:#212934;box-sizing:content-box;border-radius:50%;\"><i style=\"border-color:#212934;border-width:1px;background-color:#212934;box-sizing:content-box;height:40px;width:40px;line-height:40px;border-radius:50%;position:relative;top:auto;left:auto;margin:0;border-radius:50%;font-size:20px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-book-reader fas circle-yes\"><\/i><\/span><\/div><h2 class=\"content-box-heading\" style=\"--h2_typography-font-size:24px;line-height:29px;\">Resources<\/h2><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\n<ul>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2025\/04\/NUC-Configurator-ASI-ver4125.xlsx\" target=\"_blank\" rel=\"noopener\">ASUS NUC with vPro\u00ae<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/blog\/2024\/10\/22\/the-value-of-intel-vpro-resolving-issues-such-as-the-crowdstrike-outage\/\" target=\"_blank\" rel=\"noopener\">CrowdStrike Outage and the Value of Intel vPro\u00ae<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/blog\/2024\/11\/14\/the-pc-refresh-cycle\/\" target=\"_blank\" rel=\"noopener\">The PC Refresh Cycle, Leading with Intel vPro\u00ae<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/11\/support-hybrid-work-cloud-manageability-security-ebook.pdf\" target=\"_blank\" rel=\"noopener\">Case Study \u2013 Hybrid Work, Remote Manageability and Endpoint Security<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/11\/Ransomware-and-Intel-Threat-Detection-Technology-Report.pdf\" target=\"_blank\" rel=\"noopener\">Case Study \u2013 Intel Threat Detection Technology Improves Security<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/11\/Not-All-Remote-management-is-the-same.pdf\" target=\"_blank\" rel=\"noopener\">Not All Remote Management Solutions are the Same<\/a><\/li>\n<li><a href=\"https:\/\/www.asipartner.com\/wp-content\/uploads\/2024\/11\/Forrester-Intel-Core-Ultra-vPro.pdf\" target=\"_blank\" rel=\"noopener\">Case Study \u2013 Economic Impact of Intel vPro\u00ae<\/a><\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p>Additionally, IDC reports that over 70% of all breaches began at the endpoint. These systems are more vulnerable to attack because workers PC provide access to the company network and are typically older so they lack many of the security capabilities available on newer PCs. Additionally, because the system are remote, they typically do not have the most updated corporate software security protocols updated.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><h4>SMBs Are at Risk<\/h4>\n<p>While we tend to assume that cyber criminals only attack large enterprises, they are just as likely to target an SMB since these companies also have personal information related to their clients.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-counters-circle counters-circle\" style=\"--awb-margin-bottom:0px;\" data-animationOffset=\"top-into-view\"><div class=\"counter-circle-wrapper\" style=\"--awb-font-size:34.090909090909px;--awb-size:150px;\" data-originalsize=\"150\"><div class=\"fusion-counter-circle counter-circle counter-circle-content\" data-percent=\"61\" data-countdown=\"\" data-filledcolor=\"rgba(22,67,82,1)\" data-unfilledcolor=\"rgba(191,191,193,1)\" data-scale=\"\" data-size=\"150\" data-speed=\"1500\" data-strokesize=\"7.5\"><div class=\"fusion-counter-circle-content-inner\">61%<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-margin-top:0px;\"><p style=\"text-align: center;\"><strong>of all attacks target the US<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-counters-circle counters-circle\" style=\"--awb-margin-bottom:0px;\" data-animationOffset=\"top-into-view\"><div class=\"counter-circle-wrapper\" style=\"--awb-font-size:34.090909090909px;--awb-size:150px;\" data-originalsize=\"150\"><div class=\"fusion-counter-circle counter-circle counter-circle-content\" data-percent=\"44\" data-countdown=\"\" data-filledcolor=\"rgba(22,67,82,1)\" data-unfilledcolor=\"rgba(191,191,193,1)\" data-scale=\"\" data-size=\"150\" data-speed=\"1500\" data-strokesize=\"7.5\"><div class=\"fusion-counter-circle-content-inner\">44%<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-margin-top:0px;\"><p style=\"text-align: center;\"><strong>of all attacks target SMBs<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_4 1_4 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:25%;--awb-margin-top-large:0px;--awb-spacing-right-large:7.68%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:7.68%;--awb-width-medium:25%;--awb-order-medium:0;--awb-spacing-right-medium:7.68%;--awb-spacing-left-medium:7.68%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-counters-circle counters-circle\" style=\"--awb-margin-bottom:0px;\" data-animationOffset=\"top-into-view\"><div class=\"counter-circle-wrapper\" style=\"--awb-font-size:34.090909090909px;--awb-size:150px;\" data-originalsize=\"150\"><div class=\"fusion-counter-circle counter-circle counter-circle-content\" data-percent=\"87\" data-countdown=\"\" data-filledcolor=\"rgba(22,67,82,1)\" data-unfilledcolor=\"rgba(191,191,193,1)\" data-scale=\"\" data-size=\"150\" data-speed=\"1500\" data-strokesize=\"7.5\"><div class=\"fusion-counter-circle-content-inner\">87%<\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-margin-top:0px;\"><p style=\"text-align: center;\"><strong>of companies experience<\/strong><br \/>\n<strong>multiple attacks<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8\"><h4>Intel Hardware Shield<\/h4>\n<\/div><div class=\"fusion-text fusion-text-9\"><p>Intel Hardware Shield is a set of security technologies built in to Intel vPro that provide above and below the OS protection against cyber attacks even those that target the OS, browsers, applications, firmware, BIOS, and system memory.<\/p>\n<\/div><div class=\"fusion-text fusion-text-10\"><h5>Below the OS Protection<\/h5>\n<\/div><div class=\"fusion-tabs fusion-tabs-2 classic vertical-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-title-font-size:14px;--awb-title-text-transform:uppercase;--awb-alignment:start;--awb-inactive-color:#f9f9fb;--awb-background-color:#ffffff;--awb-border-color:#e2e2e2;--awb-active-border-color:#0076a4;\"><div class=\"nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-e872601795b60504700\" aria-selected=\"true\" id=\"fusion-tab-intelbiosguard\" href=\"#tab-e872601795b60504700\"><h5 class=\"fusion-tab-heading\">Intel BIOS Guard<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-80b199f8faa3ef3d338\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelbootguard\" href=\"#tab-80b199f8faa3ef3d338\"><h5 class=\"fusion-tab-heading\">Intel Boot Guard<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b476e7f73cdbe6767fa\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelplatformtrusttechnology(intelptt)\" href=\"#tab-b476e7f73cdbe6767fa\"><h5 class=\"fusion-tab-heading\">Intel Platform Trust Technology (Intel PTT)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-142931e5bb48d8452dd\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelruntimebiosresilience\" href=\"#tab-142931e5bb48d8452dd\"><h5 class=\"fusion-tab-heading\">Intel Runtime BIOS Resilience<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-683ce29356e512f554d\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelruntimeexecutiontechnology(inteltxt)\" href=\"#tab-683ce29356e512f554d\"><h5 class=\"fusion-tab-heading\">Intel Runtime Execution Technology (Intel TXT)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d57370f592afe2377c8\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelsystemresourcedefense\" href=\"#tab-d57370f592afe2377c8\"><h5 class=\"fusion-tab-heading\">Intel System Resource Defense<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b985e05f764b8992884\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelsystemsecurityreport\" href=\"#tab-b985e05f764b8992884\"><h5 class=\"fusion-tab-heading\">Intel System Security Report<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-c49e737d09f554a5cea\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelfirmwareguardupdate\/recovery\" href=\"#tab-c49e737d09f554a5cea\"><h5 class=\"fusion-tab-heading\">Intel Firmware Guard Update\/Recovery<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-e872601795b60504700\" aria-selected=\"true\" id=\"mobile-fusion-tab-intelbiosguard\" href=\"#tab-e872601795b60504700\"><h5 class=\"fusion-tab-heading\">Intel BIOS Guard<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelbiosguard\" id=\"tab-e872601795b60504700\">\n<p>Hardware that helps to create a small trust boundary to reduces the risk of flash-based attacks.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-80b199f8faa3ef3d338\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelbootguard\" href=\"#tab-80b199f8faa3ef3d338\"><h5 class=\"fusion-tab-heading\">Intel Boot Guard<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelbootguard\" id=\"tab-80b199f8faa3ef3d338\">\n<p>Hardware that helps to mitigate unauthorized BIOS boot block modifications.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b476e7f73cdbe6767fa\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelplatformtrusttechnology(intelptt)\" href=\"#tab-b476e7f73cdbe6767fa\"><h5 class=\"fusion-tab-heading\">Intel Platform Trust Technology (Intel PTT)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelplatformtrusttechnology(intelptt)\" id=\"tab-b476e7f73cdbe6767fa\">\n<p>A hardware-integrated credential storage and key management solution optimized for low power consumption.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-142931e5bb48d8452dd\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelruntimebiosresilience\" href=\"#tab-142931e5bb48d8452dd\"><h5 class=\"fusion-tab-heading\">Intel Runtime BIOS Resilience<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelruntimebiosresilience\" id=\"tab-142931e5bb48d8452dd\">\n<p>Hardware helps PC manufacturers enforce a below-the-OS policy to reduce the risk of malware injection, making the platform more secure against attacks launched from System Management Mode (SMM).<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-683ce29356e512f554d\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelruntimeexecutiontechnology(inteltxt)\" href=\"#tab-683ce29356e512f554d\"><h5 class=\"fusion-tab-heading\">Intel Runtime Execution Technology (Intel TXT)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelruntimeexecutiontechnology(inteltxt)\" id=\"tab-683ce29356e512f554d\">\n<p>Using this hardware-verified benchmark, helps a system quickly assess whether any attempts have been made to alter or tamper with the launch time environment.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d57370f592afe2377c8\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelsystemresourcedefense\" href=\"#tab-d57370f592afe2377c8\"><h5 class=\"fusion-tab-heading\">Intel System Resource Defense<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelsystemresourcedefense\" id=\"tab-d57370f592afe2377c8\">\n<p>Hardware extends enforcement of resource access policies for System Management Interface (SMI) handler firmware beyond memory resources to help reduce the attack surface in System Management Mode (SMM).<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b985e05f764b8992884\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelsystemsecurityreport\" href=\"#tab-b985e05f764b8992884\"><h5 class=\"fusion-tab-heading\">Intel System Security Report<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelsystemsecurityreport\" id=\"tab-b985e05f764b8992884\">\n<p>A patented, trusted hardware-to-software channel for gaining below-the-OS security visibility.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-c49e737d09f554a5cea\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelfirmwareguardupdate\/recovery\" href=\"#tab-c49e737d09f554a5cea\"><h5 class=\"fusion-tab-heading\">Intel Firmware Guard Update\/Recovery<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelfirmwareguardupdate\/recovery\" id=\"tab-c49e737d09f554a5cea\">\n<p>Supply-chain leadership enables IT to update the firmware on an end user\u2019s system and also recover from a firmware failure\u2014without user intervention.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-text fusion-text-11\"><h5>Advanced Threat Protections<\/h5>\n<\/div><div class=\"fusion-tabs fusion-tabs-3 classic vertical-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-title-font-size:14px;--awb-title-text-transform:uppercase;--awb-alignment:start;--awb-inactive-color:#f9f9fb;--awb-background-color:#ffffff;--awb-border-color:#e2e2e2;--awb-active-border-color:#0076a4;\"><div class=\"nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-5c830878d3b692e0132\" aria-selected=\"true\" id=\"fusion-tab-intelthreatdetectiontechnology(inteltdt)\" href=\"#tab-5c830878d3b692e0132\"><h5 class=\"fusion-tab-heading\">Intel Threat Detection Technology (Intel TDT)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9d22b50a1a84627e01a\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-acceleratedmemoryscanning\" href=\"#tab-9d22b50a1a84627e01a\"><h5 class=\"fusion-tab-heading\">Accelerated Memory Scanning<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-7d8571daadf6ec37a96\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-advancedplatformtelemetry\" href=\"#tab-7d8571daadf6ec37a96\"><h5 class=\"fusion-tab-heading\">Advanced Platform Telemetry<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-cbdcb4c24982b7d31fa\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-anomalousbehaviordetection\" href=\"#tab-cbdcb4c24982b7d31fa\"><h5 class=\"fusion-tab-heading\">Anomalous Behavior Detection<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-839944bae39c38a0228\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelcontrolflowenforcementtechnology\" href=\"#tab-839944bae39c38a0228\"><h5 class=\"fusion-tab-heading\">Intel Control Flow Enforcement Technology<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-5c830878d3b692e0132\" aria-selected=\"true\" id=\"mobile-fusion-tab-intelthreatdetectiontechnology(inteltdt)\" href=\"#tab-5c830878d3b692e0132\"><h5 class=\"fusion-tab-heading\">Intel Threat Detection Technology (Intel TDT)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelthreatdetectiontechnology(inteltdt)\" id=\"tab-5c830878d3b692e0132\">\n<p>Helps identify polymorphic malware, file-less scripts, crypto mining and other targeted attacks \u2013 in real time, with minimal end user impact.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9d22b50a1a84627e01a\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-acceleratedmemoryscanning\" href=\"#tab-9d22b50a1a84627e01a\"><h5 class=\"fusion-tab-heading\">Accelerated Memory Scanning<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-acceleratedmemoryscanning\" id=\"tab-9d22b50a1a84627e01a\">\n<p>Intel integrated graphic technology GPU-enables offload compute-intensive AI algorithms and other security workloads to the Intel integrated GPU.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-7d8571daadf6ec37a96\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-advancedplatformtelemetry\" href=\"#tab-7d8571daadf6ec37a96\"><h5 class=\"fusion-tab-heading\">Advanced Platform Telemetry<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-advancedplatformtelemetry\" id=\"tab-7d8571daadf6ec37a96\">\n<p>A highly effective, low-overhead tool that does not require intrusive scanning techniques or signature databases, leading to improved malware detection.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-cbdcb4c24982b7d31fa\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-anomalousbehaviordetection\" href=\"#tab-cbdcb4c24982b7d31fa\"><h5 class=\"fusion-tab-heading\">Anomalous Behavior Detection<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-anomalousbehaviordetection\" id=\"tab-cbdcb4c24982b7d31fa\">\n<p>Monitors applications for early indicators of compromise. ABD leverages CPU execution control-flow tracking to build dynamic AI models of &#8220;good&#8221; application behavior.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-839944bae39c38a0228\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelcontrolflowenforcementtechnology\" href=\"#tab-839944bae39c38a0228\"><h5 class=\"fusion-tab-heading\">Intel Control Flow Enforcement Technology<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelcontrolflowenforcementtechnology\" id=\"tab-839944bae39c38a0228\">\n<p>Helps protect against the misuse of legitimate code through control-flow hijacking attacks.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-text fusion-text-12\"><h5>Application and Data Protections<\/h5>\n<\/div><div class=\"fusion-tabs fusion-tabs-4 classic vertical-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:0px;--awb-title-border-radius-top-right:0px;--awb-title-border-radius-bottom-right:0px;--awb-title-border-radius-bottom-left:0px;--awb-title-font-size:14px;--awb-title-text-transform:uppercase;--awb-alignment:start;--awb-inactive-color:#f9f9fb;--awb-background-color:#ffffff;--awb-border-color:#e2e2e2;--awb-active-border-color:#0076a4;\"><div class=\"nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-50a7a8b58679d1c32f1\" aria-selected=\"true\" id=\"fusion-tab-inteltotalmemoryencryption(inteltme)\" href=\"#tab-50a7a8b58679d1c32f1\"><h5 class=\"fusion-tab-heading\">Intel Total Memory Encryption (Intel TME)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d5a6e43c2af4cc41f13\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelapicvirtualizationtechnology(intelapicv)\" href=\"#tab-d5a6e43c2af4cc41f13\"><h5 class=\"fusion-tab-heading\">Intel APIC Virtualization Technology (Intel APICv)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-54ac5e2f95559300aef\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-inteltotalmemoryencryption\u2013multi-key(inteltme-mk)\" href=\"#tab-54ac5e2f95559300aef\"><h5 class=\"fusion-tab-heading\">Intel Total Memory Encryption \u2013 Multi-Key (Intel TME-MK)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-59fd3e784e109f72721\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelvirtualizationtechnology\u2013redirectprotections(intelvt-rp)\" href=\"#tab-59fd3e784e109f72721\"><h5 class=\"fusion-tab-heading\">Intel Virtualization Technology \u2013 Redirect Protections (Intel VT-rp)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-7aac7e5307b58d7d485\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelvirtualizationtechnology(intelvt-x)\" href=\"#tab-7aac7e5307b58d7d485\"><h5 class=\"fusion-tab-heading\">Intel Virtualization Technology (Intel VT-x)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d4d149398aadada75d8\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelvirtualizationtechnologyfordirectedi\/o(intelvt-d)\" href=\"#tab-d4d149398aadada75d8\"><h5 class=\"fusion-tab-heading\">Intel Virtualization Technology for Directed I\/O (Intel VT-d)<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-5820fa95dc33caefcb2\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-intelkeylocker\" href=\"#tab-5820fa95dc33caefcb2\"><h5 class=\"fusion-tab-heading\">Intel Key Locker<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-df8a120f446eb8f77e9\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-modebasedexecutioncontrol\" href=\"#tab-df8a120f446eb8f77e9\"><h5 class=\"fusion-tab-heading\">Mode Based Execution Control<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9eb06e932273bf7dbd9\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-kernaldmaprotection\" href=\"#tab-9eb06e932273bf7dbd9\"><h5 class=\"fusion-tab-heading\">Kernal DMA Protection<\/h5><\/a><\/li><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-2cb862fe768da726187\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-inteladvancedencryptionstandardnewinstructions(intelaes-ni)\" href=\"#tab-2cb862fe768da726187\"><h5 class=\"fusion-tab-heading\">Intel Advanced Encryption Standard New Instructions (Intel AES-NI)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-50a7a8b58679d1c32f1\" aria-selected=\"true\" id=\"mobile-fusion-tab-inteltotalmemoryencryption(inteltme)\" href=\"#tab-50a7a8b58679d1c32f1\"><h5 class=\"fusion-tab-heading\">Intel Total Memory Encryption (Intel TME)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-inteltotalmemoryencryption(inteltme)\" id=\"tab-50a7a8b58679d1c32f1\">\n<p>Helps prevent data exposure via \u201ccold boot\u201d\/physical memory\/DIMM removal attacks in the event of a stolen system.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d5a6e43c2af4cc41f13\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelapicvirtualizationtechnology(intelapicv)\" href=\"#tab-d5a6e43c2af4cc41f13\"><h5 class=\"fusion-tab-heading\">Intel APIC Virtualization Technology (Intel APICv)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelapicvirtualizationtechnology(intelapicv)\" id=\"tab-d5a6e43c2af4cc41f13\">\n<p>Helps protect virtualized systems by enabling all activities to stay inside the VM, while reducing interrupt overhead and increasing I\/O throughput.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-54ac5e2f95559300aef\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-inteltotalmemoryencryption\u2013multi-key(inteltme-mk)\" href=\"#tab-54ac5e2f95559300aef\"><h5 class=\"fusion-tab-heading\">Intel Total Memory Encryption \u2013 Multi-Key (Intel TME-MK)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-inteltotalmemoryencryption\u2013multi-key(inteltme-mk)\" id=\"tab-54ac5e2f95559300aef\">\n<p>Encrypt different types of DRAM traffic, helping isolate tasks, and improve overall security in a more efficient manner.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-59fd3e784e109f72721\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelvirtualizationtechnology\u2013redirectprotections(intelvt-rp)\" href=\"#tab-59fd3e784e109f72721\"><h5 class=\"fusion-tab-heading\">Intel Virtualization Technology \u2013 Redirect Protections (Intel VT-rp)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelvirtualizationtechnology\u2013redirectprotections(intelvt-rp)\" id=\"tab-59fd3e784e109f72721\">\n<p>Extends hardware-rooted virtualization-based security to Intel vPro\u00ae PCs helping boost security for virtualized environments.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-7aac7e5307b58d7d485\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelvirtualizationtechnology(intelvt-x)\" href=\"#tab-7aac7e5307b58d7d485\"><h5 class=\"fusion-tab-heading\">Intel Virtualization Technology (Intel VT-x)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelvirtualizationtechnology(intelvt-x)\" id=\"tab-7aac7e5307b58d7d485\">\n<p>Hardware virtualization technology provides enhanced security by isolating different workspaces and reducing attack surfaces.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-d4d149398aadada75d8\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelvirtualizationtechnologyfordirectedi\/o(intelvt-d)\" href=\"#tab-d4d149398aadada75d8\"><h5 class=\"fusion-tab-heading\">Intel Virtualization Technology for Directed I\/O (Intel VT-d)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelvirtualizationtechnologyfordirectedi\/o(intelvt-d)\" id=\"tab-d4d149398aadada75d8\">\n<p>Helps protect secure workloads from unauthorized device Direct Memory Access (DMA) initiated from the main OS.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-5820fa95dc33caefcb2\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-intelkeylocker\" href=\"#tab-5820fa95dc33caefcb2\"><h5 class=\"fusion-tab-heading\">Intel Key Locker<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-intelkeylocker\" id=\"tab-5820fa95dc33caefcb2\">\n<p>Only on Chrome Devices. Help protect AES keys by keeping the raw keys exposed for a minimal amount of time to reduce the chances they are compromised by rogue attackers.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-df8a120f446eb8f77e9\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-modebasedexecutioncontrol\" href=\"#tab-df8a120f446eb8f77e9\"><h5 class=\"fusion-tab-heading\">Mode Based Execution Control<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-modebasedexecutioncontrol\" id=\"tab-df8a120f446eb8f77e9\">\n<p>Enables hypervisors to more reliably verify and enforce the integrity of kernel level code to help provide an extra layer of protection from malware attacks.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-9eb06e932273bf7dbd9\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-kernaldmaprotection\" href=\"#tab-9eb06e932273bf7dbd9\"><h5 class=\"fusion-tab-heading\">Kernal DMA Protection<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-kernaldmaprotection\" id=\"tab-9eb06e932273bf7dbd9\">\n<p>Helps reduce the risk of the risk of \u201cdrive-by\u201d DMA attacks of hot plug PCIe ports such as Thunderbolt\u2122 technology.<\/p>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs\" role=\"tablist\"><li role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-2cb862fe768da726187\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-inteladvancedencryptionstandardnewinstructions(intelaes-ni)\" href=\"#tab-2cb862fe768da726187\"><h5 class=\"fusion-tab-heading\">Intel Advanced Encryption Standard New Instructions (Intel AES-NI)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-inteladvancedencryptionstandardnewinstructions(intelaes-ni)\" id=\"tab-2cb862fe768da726187\">\n<p>Gives IT environments faster, more affordable data protection and more security by accelerating data encryption.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":3459,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-9046","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Intel vPro Technology - ASI Canada<\/title>\n<meta name=\"description\" content=\"Maximize server performance with Intel Xeon 6 processors. Designed to excel in compute-intensive workloads and optimize density and energy efficiency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intel vPro Technology\" \/>\n<meta property=\"og:description\" content=\"Maximize server performance with Intel Xeon 6 processors. Designed to excel in compute-intensive workloads and optimize density and energy efficiency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"ASI Canada\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-22T13:32:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/\",\"url\":\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/\",\"name\":\"Intel vPro Technology - ASI Canada\",\"isPartOf\":{\"@id\":\"https:\/\/www.asipartner.com\/canada\/#website\"},\"datePublished\":\"2024-11-20T15:39:30+00:00\",\"dateModified\":\"2025-04-22T13:32:30+00:00\",\"description\":\"Maximize server performance with Intel Xeon 6 processors. Designed to excel in compute-intensive workloads and optimize density and energy efficiency.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.asipartner.com\/canada\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel vPro Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.asipartner.com\/canada\/#website\",\"url\":\"https:\/\/www.asipartner.com\/canada\/\",\"name\":\"ASI Canada\",\"description\":\"Just another ASI Partner Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.asipartner.com\/canada\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Intel vPro Technology - ASI Canada","description":"Maximize server performance with Intel Xeon 6 processors. Designed to excel in compute-intensive workloads and optimize density and energy efficiency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/","og_locale":"en_US","og_type":"article","og_title":"Intel vPro Technology","og_description":"Maximize server performance with Intel Xeon 6 processors. Designed to excel in compute-intensive workloads and optimize density and energy efficiency.","og_url":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/","og_site_name":"ASI Canada","article_modified_time":"2025-04-22T13:32:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/","url":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/","name":"Intel vPro Technology - ASI Canada","isPartOf":{"@id":"https:\/\/www.asipartner.com\/canada\/#website"},"datePublished":"2024-11-20T15:39:30+00:00","dateModified":"2025-04-22T13:32:30+00:00","description":"Maximize server performance with Intel Xeon 6 processors. Designed to excel in compute-intensive workloads and optimize density and energy efficiency.","breadcrumb":{"@id":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.asipartner.com\/canada\/solutions\/intel-vpro-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.asipartner.com\/canada\/solutions\/"},{"@type":"ListItem","position":2,"name":"Intel vPro Technology"}]},{"@type":"WebSite","@id":"https:\/\/www.asipartner.com\/canada\/#website","url":"https:\/\/www.asipartner.com\/canada\/","name":"ASI Canada","description":"Just another ASI Partner Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.asipartner.com\/canada\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"}]}},"_links":{"self":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/9046","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/comments?post=9046"}],"version-history":[{"count":4,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/9046\/revisions"}],"predecessor-version":[{"id":9207,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/9046\/revisions\/9207"}],"up":[{"embeddable":true,"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/pages\/3459"}],"wp:attachment":[{"href":"https:\/\/www.asipartner.com\/canada\/wp-json\/wp\/v2\/media?parent=9046"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}