A New Level of Built-in PC Security

Intel® Hardware Shield, now available on the 11th Gen Intel vPro® mobile platform, provides the highest performance and most comprehensive hardware-based security for business.1 2

Businesses face increasing numbers, types, complexity, and severity of cyberattacks. Intel® Hardware Shield, exclusive to the Intel vPro® platform, helps protect and defend against modern threats with defense in depth at each layer: hardware, BIOS/firmware, hypervisor, VMs, OS and applications.

Below-the-OS Security from Attacks at the Firmware and Hardware Levels

A Windows 10 Enterprise-based Intel vPro platform offers the unique capabilities of Intel Hardware Shield built-in to deliver the highest level of hardware, software and data protection right out of the box.

  • Minimize the risk of malicious code injection by using Intel Hardware Shield to lock down memory in the BIOS when software is running and help prevent planted malware from compromising the OS.
  • Help ensure your OS boots securely with Intel Hardware Shield that offers many hardware-based security capabilities that support a secure boot, allowing your PCs to launch into a trusted state.

Extend Protections of Your Applications and Data with Hardware-Accelerated Virtualization and Encryption

Enable hardware-based virtualization to help protect user access credentials, workspaces, applications and data in hardened enclaves.

  • Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel Hardware Shield.
  • Accelerate virtualized security software like Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel-level malware and browser-based attacks.
  • Complement virtualization with hardware-based encryption to help protect data at every layer.

Help Detect and Respond to Advanced Threats

Mitigate extreme attacks like control-flow hijacking, ransomware, and crypto mining.

  • Software developers like Microsoft use Intel® Control-Flow Enforcement Technology (Intel® CET), part of Intel Hardware Shield, to help defend against attacks on system memory.
  • Defend against ransomware and malicious crypto mining with Intel® Threat Detection Technology (Intel® TDT), part of Intel Hardware Shield. Hardware-based threat detection to detect the latest threats such as crypto mining and ransomware without an impact on performance.

Built for Business Innovation

Transform computing endpoints into strategic corporate assets by selecting devices built on the Intel vPro® platform.

Disclaimer

Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.

Informações de produto e desempenho

1

Em dispositivos finos e leves com Windows, conforme medição em testes realizados em 1º de dezembro de 2020 com Intel® Core™ i7-1185G7 sobre parâmetros de comparação do setor, teste do guia de uso representativo e recursos exclusivos, incluindo em comparação com o AMD Ryzen 7 Pro 4750U em três usos principais: produtividade, criação e colaboração, bem como o estudo da IOActive (encomendado pela Intel) de dezembro de 2020 comparando as capacidades de segurança do Intel® Hardware Shield com tecnologias correspondentes em um AMD Ryzen Pro 4750U.

2

Para cargas de trabalho e configurações, acesse www.Intel.com.br/PerformanceIndex. Os resultados podem variar.