Intel Releases Core vPro Processors - InformationWeek
IoT
IoT
Infrastructure // PC & Servers
News
3/7/2011
07:35 PM
50%
50%
RELATED EVENTS
Threat Intelligence Overload?
Aug 23, 2017
A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to ...Read More>>

Intel Releases Core vPro Processors

Laptops with the second-generation Core i3, i5, and i7 business chips can be disabled remotely using text messages in the event of theft.

Intel has released its second-generation Core vPro processors, which include the ability to disable a lost or stolen laptop by sending an encrypted text message.

Intel unveiled the latest chips Monday, saying the new products will be used in business laptops, convertible tablets, desktops, and all-in-one PCs that will be available soon from computer makers, including Dell, Fujitsu, Hewlett-Packard, and Lenovo. Intel's vPro technology, which has been around for about five years, provides PC security and management capabilities for business IT departments.

"Providing the right combination of technologies at the right time, the new Intel Core vPro processor family continues Intel's advancement in performance, security, and management," Rich Echevarria, VP of the Intel Architecture Group, said in a statement.

The latest version of the platform, which is available with Intel's new Core i3, i5, and i7 business chips, includes the third generation of the company's Anti-Theft Technology. Previous versions made it possible for IT staff to send a coded "poison pill" over the Internet to disable a laptop to prevent theft of corporate data. The latest version makes it possible to send an encrypted authenticated text message via SMS, or short message service, over a 3G cellular network to disable the PC. If the system is recovered, it can be reactivated using another message.

A survey of 329 organizations, conducted last year by the Ponemon Institute and sponsored by Intel, found that businesses lost more than 86,000 laptops over the course of a year. A 2009 Ponemon survey put the average cost of lost laptop data at $49,246, which means the price tag for losing so many laptops is $2.1 billion, or $6.4 million per organization.

Other security features include requiring an encryption login when a PC is awakened from a standby state. The procedure is more secure than the usual username and password, Intel says.

The vPro platform also includes Intel's Identity Protection Technology, which makes it possible for a security firm to embed in the chipset a credential that supporting Web sites would used to identify visiting PC users. The purpose of the technology is to prevent a hacker from entering a Web site without a laptop with the IPT. Companies offering products that take advantage of the new technology include Symantec and VASCO.

New management features include "host-based configuration," which automates the process of setting up vPro functions on new PCs, Intel says. As a result, IT staff can configure large numbers of computers simultaneously.

The platform's keyboard-video-mouse remote control enables a technician in another location to see the screen of a user's PC in higher resolutions in order to accommodate HD video and screen sizes. In the past, technicians would only see the screen in low resolution, which makes it more difficult to diagnose the problem, if the PC is used in computer-aided design or professional video editing.

Intel also announced that it was bringing its vPro platform to the upcoming Xeon server processor E3-1200 product family, which is found in entry-level workstations.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll