Deliver Secure Connectivity with First-Class Processing Power
The Internet of Things (IoT) offers tremendous new business opportunities. By leveraging the Intel® family of processors, organizations can integrate real-time intelligence, control, and interactivity into almost any process. Drive high capability and value into your IoT endeavors by choosing processors that run on a wide variety of operating systems.
Intel® Processors
Intel® Quark™, Intel® Atom™, and Intel® Core™ processors each support a wide range of price/performance points with a common set of code. Analytics, encryption, and new application requirements in IoT are driving the need for high levels of performance and computing headroom. For every case, there’s an Intel processor. Choose the processor that best fits your needs.

Intel® Quark™ SoC X1000 series
Ideal when lower power and size take priority over higher performance.

Intel® Atom™ processor E3800 product family
Low power and thermally efficient application performance in small-form-factor devices.

5th Generation Intel® Core™ Processors
Exceptional compute, graphics, and media performance, along with enhanced security and I/O flexibility.

4th Generation Intel® Core™ Processors (Mobile)
Discover some of the embedded products offered from our Solutions Alliance partners based on 4th generation Intel® Core™ processors with mobile Intel® QM87 and HM86 chipsets.

4th Generation Intel® Core™ Processors (Desktop)
Discover some of the embedded products offered from our Solutions Alliance partners based on 4th generation Intel® Core™ processors with Intel® Q87 chipsets.
Network Connectivity
A fundamental concept behind the Internet of Things is connecting the vast majority of systems in the world to a common network and infrastructure. Intel is the industry leader in Ethernet, delivering high-quality products for 30 years and offering a broad product and technology portfolio of cost-effective, efficient solutions for things.

Intel® Ethernet Controller I210
A low-power, small-footprint, single-port gigabit LAN on motherboard (LOM) network controller with integrated MAC and PHY.

Intel® XMM™ Platforms
Slim modem platforms for 2G/3G/LTE support enabling high-speed data and voice.

Intel® Chipsets
Support for a wide range of I/O interfaces, including Ethernet, USB, RS-232, RS-485, CAN, line out, PCI Express*, and SPI. These interfaces can also connect to modules supporting cellular, Bluetooth*, ZigBee*, Wi-Fi*, and other wireless technologies.
Wind River Operating Systems
Intel® processors run a wide variety of operating systems, including the following from Wind River:

Wind River VxWorks*
is the world's leading commercial real-time operating system (RTOS) and has been serving the needs of embedded systems of all shapes and sizes for more than 30 years.

Wind River Linux*
is the leading commercial embedded Linux platform and the first to bring the advantages of open source to all industries.

Wind River Android*
offers a portfolio of software and testing products to support rapid and high-quality platform and application development for devices running the Android operating system.
Security Solutions
Organizations are under increasing pressure to protect sensitive data, and prevent device theft and malware attacks. Intel and McAfee help you mitigate risk by offering various security products that can be deployed on things, including:

McAfee Embedded Control
Maintain the integrity of things by allowing only authorized code to run and authorized changes to be made. This security software automatically creates a dynamic whitelist of the "authorized code" on the system, which locks down the system to a known good baseline.

ePolicy Orchestrator® (McAfee ePO™)
Unify security management through an open platform using McAfee ePO™—the most advanced, extensible, and scalable centralized security management software in the industry. This solution reduces the cost and complexity of security and compliance administration.

Intel® Identity Protection Technology (Intel® IPT)
Prevent unauthorized access to data stored in the cloud using strong, hardware-based authentication. This tamper-proof solution operates in isolation from the operating system and provides a simple way for web sites and organizations to validate that a user is logging in from a trusted device.