Conservative estimates suggest that by 2015, over 10 billion personal electronic devices will be in active use—and the vast majority of these will be mobile- and Web-enabled. With this rapidly expanding dependence on computing devices comes the need to create more secure software and hardware products for businesses and consumers to prevent exposure to malicious code, viruses, cyber espionage, malware, and data theft.
Intel's Approach to Security
Intel continues to enhance systems so they run more securely. A key component of this approach is providing more robust, vulnerability-resistant platforms. Security features are embedded in the hardware of Intel® processors, including three of Intel's newest server processors—the Intel® Xeon® processor E3 v2 family, the Intel® Xeon® processor E5 family, and the Intel® Xeon® processor E7 family, as well as 3rd generation Intel® Core™ vPro™ processors.
However, Intel® products are only part of making computing more secure. We recognize the need to engage the entire technology ecosystem to cultivate more complete protection. With this in mind, Intel continues to strengthen its relationship with both software and hardware security vendors for complementary solutions. It also works with traditional general-purpose software providers to encourage greater implementation of secure computing.
Embedded Security Features
“Blanket” protection – Intel® vPro™ technology with built-in security capabilities protects the PCs in your IT environment.1
Identity protection – Authentication technology built right into the hardware of select 3rd generation Intel® Core™ processors protects user identity and online access points.2
Asset protection – Intel® Anti-Theft Technology protects your corporate data by locking down your lost or stolen laptop.3
Data protection – Faster decryption and encryption through Intel® AES–NI.4
Malware protection – Intel® Trusted Execution Technology hardware-assisted security protects the IT infrastructure from software-based attacks and provides a powerful new control point for virtualized and cloud workloads.5
Hardware-assisted virtualization – Enables IT to verify the trustworthiness of a virtualized pool of platforms.6