Intel DQ77CP Technical Product Specification - Page 31
Intel, Security and Manageability, Technologies - vpro
View all Intel DQ77CP manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 31 highlights
Product Description 1.11 Intel® Security and Manageability Technologies Intel® Security and Manageability Technologies provides tools and resources to help small business owners and IT organizations protect and manage their assets in a business or institutional environment. NOTE Software with security and/or manageability capability is required to take advantage of Intel platform security and/or management technologies. 1.11.1 Intel® vPro™ Technology Intel® vPro™ Technology is a collection of platform capabilities that support enhanced manageability, security, virtualization and power efficiency. The key platform capabilities include: • Intel® Turbo Boost Technology for increased performance and power efficiency • Intel® Hyper-Threading Technology (Intel® HT) for higher performance • Intel® Active Management Technology (Intel® AMT) • Intel® Virtualization (Intel® VT) • Intel® Virtualization for Directed I/O (Intel® VT-d) • Intel® Trusted Execution Technology (Intel® TXT) • Intel® Identity Protection Technology (Intel® IPT) • Intel® Anti-Theft Technology (Intel® AT) For information about Intel vPro Technology Refer to http://support.intel.com/support/vpro/ 1.11.1.1 Intel® Active Management Technology When used with third-party management and security applications, Intel Active Management Technology (Intel AMT) allows business owners and IT organizations to better discover, heal, and protect their networked computing assets. Some of the features of Intel AMT include: • Out-of-band (OOB) system access, to discover assets even while PCs are powered off • Remote trouble-shooting and recovery, which allows remote diagnosis and recovery of systems after OS failures • Hardware-based agent presence checking that automatically detects and alerts when critical software agents have been stopped or are missing • Proactive network defense, which uses filters to block incoming threats while isolating infected clients before they impact the network • Remote hardware and software asset tracking, helping to track computer assets and keep virus protection up-to-date 31