Enterprise Security: Intel® Anti-Theft Technology
Disable access to missing laptops
Giving users access to corporate data and application through remote laptops boosts productivity, but it can also leave IT vulnerable to hackers and misplaced laptops. Intel® Anti-Theft Technology is built into the laptop hardware, helping IT administrators outwit thieves, even when they attempt to reimage the OS, change the boot order, or install a new hard drive. When laptops with Intel® Anti-Theft Technology (Intel® AT) become lost or stolen, they can be remotely disabled. If the laptop is recovered, it can be quickly reactivated to normal operation.
Safeguard corporate laptops with Intel® Anti-Theft Technology
See how Intel® AT provides peace of mind by helping keep company laptops and assets safe.
Gdzie kupowaćUzyskaj status Channel Partner >
FilmyWyświetl więcej filmów
Section 2: Intel® SCS Training
Covering Intel® AMT Configuration Utility, remote configuration services, and discovery of Intel® SCS.
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase efficiency.
McAfee: Utility Substation Protection
Demos using existing embedded cyber security technology to simulate utility substation protection.
Obsługa pracy mobilnej
Wielopoziomowe mechanizmy zabezpieczeń w ramach technologii Intel® Anti-Theft obecne w laptopach z technologią Intel® Core™ vPro™
Ochrona zgubionych komputerów dzięki technologiom firmy...
Dowiedz się, jak procesory Intel® Core™ vPro™ z technologią Intel® Anti-Theft chronią zgubione lub skradzione komputery. (2:47)
Crimeware Protection on 4th Gen Intel® Core™ vPro™...
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.
Inside IT: Privacy Principles
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Inside IT: Enterprise Security Business Velocity
Intel CSO Malcolm Harkins discusses security and privacy.
Inside IT: McAfee Drive Encryption at Intel
Addressing challenges of maintaining productivity and reliability while protecting data.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix vulnerabilities.
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing productivity.
Security in the Data Center Video
Dylan Larson from Intel discusses the importance of data center security. (5:37)
Inside IT: Security by Design
Adding security throughout development and manufacturing.
Intel Security Keeps Enterprise Resilient
Hardware-enhanced features find, freeze, and fix vulnerabilities to enterprise infrastructure.