Feeds

Intel puts more hardware security in vPro line

Refreshes stale chips

Internet Security Threat Report 2014

After months of hyping, Intel is rolling out an update to its vPro technology featuring improved hardware-based security and manageability tools for its chips.

The latest rev of vPro will see the introduction of Intel's hardware-based Trusted Execution Technology (TXT), which the company says will defend PCs against attacks aimed at stealing sensitive information. Using virtualization, TXT can isolate an application within the hardware particulars and a memory partition, which will stop all other hardware or software from accessing the application. TXT also allows new software to be booted into a trusted state. When the application is removed, it purges all the application's data and information from the system.

"Today, most security software runs above the OS," said Intel exec Robert Crooke, speaking at an event here. "and there's some great security software out there — but it leaves the computer vulnerable to attacks to that software and on the operating system level."

In addition, vPro will ship with the third generation of Intel Active Management Technology (AMT). The engine helps manage, inventory, diagnose and repair PCs even when the system is turned off or has suffered an OS or hard drive crash. The new version of AMT will allow IT to isolate an infected PC from the corporate network.

vPro also now supports new standards from Desktop Mobile Working Group (DMWG), which is a specification for compatibility across PC hardware and software developed by the Distributed Management Task Force (DMTF).

The platform's embedded trust agent has been certified by Cisco, providing 802.1x compatible manageability that's not dependent on OS-availability. The agent allows Cisco's customers to manage systems — again, even if shut down — without lowering the security on 802.1x networks and Cisco Self-Defending Network products.

The fresh vPro package ships with the latest version of Intel's Core 2 Duo processor and Q35 Express chipset, which the company says will give 30 per cent greater performance than the previous generation while significantly reducing power consumption.

Desktops and notebooks with vPro will be sold to OEM vendors such as Dell, Lenovo and HP. ®

Internet Security Threat Report 2014

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Will BlackBerry make a comeback with its SQUARE smartphones?
Plus PC PIMs from company formerly known as RIM
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
Soundbites: News in brief from the Wi-Fi audiophile files
DTS and Sonos sing out but not off the same hymnsheet
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.