Intel DC53427HYE Technical Product Specification - Page 36
Intel, Security and Manageability, Technologies
View all Intel DC53427HYE manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 36 highlights
Intel NUC D53427RKE Technical Product Specification 1.11 Intel® Security and Manageability Technologies Intel® Security and Manageability Technologies provides tools and resources to help small business owners and IT organizations protect and manage their assets in a business or institutional environment. NOTE Software with security and/or manageability capability is required to take advantage of Intel platform security and/or management technologies. 1.11.1 Intel® vPro™ Technology Intel® vPro™ Technology is a collection of platform capabilities that support enhanced manageability, security, virtualization and power efficiency. The key platform capabilities include: • Intel® Active Management Technology (Intel® AMT) 8.0 • Intel® Virtualization (Intel® VT) • Intel® Virtualization for Directed I/O (Intel® VT-d) • Intel® Trusted Execution Technology (Intel® TXT) • Intel® Identity Protection Technology (Intel® IPT) • Intel® Anti-Theft Technology (Intel® AT) • Trusted Platform Module (TPM) For information about Intel vPro Technology Refer to http://support.intel.com/support/vpro/ 1.11.1.1 Intel® Active Management Technology When used with third-party management and security applications, Intel Active Management Technology (Intel AMT) allows business owners and IT organizations to better discover, heal, and protect their networked computing assets. Some of the features of Intel AMT include: • Out-of-band (OOB) system access, to discover assets even while PCs are powered off • Remote trouble-shooting and recovery, which allows remote diagnosis and recovery of systems after OS failures • Hardware-based agent presence checking that automatically detects and alerts when critical software agents have been stopped or are missing • Proactive network defense, which uses filters to block incoming threats while isolating infected clients before they impact the network • Remote hardware and software asset tracking, helping to track computer assets and keep virus protection up-to-date 36