Intel DC53427HYE Technical Product Specification - Page 36

Intel, Security and Manageability, Technologies

Page 36 highlights

Intel NUC D53427RKE Technical Product Specification 1.11 Intel® Security and Manageability Technologies Intel® Security and Manageability Technologies provides tools and resources to help small business owners and IT organizations protect and manage their assets in a business or institutional environment. NOTE Software with security and/or manageability capability is required to take advantage of Intel platform security and/or management technologies. 1.11.1 Intel® vPro™ Technology Intel® vPro™ Technology is a collection of platform capabilities that support enhanced manageability, security, virtualization and power efficiency. The key platform capabilities include: • Intel® Active Management Technology (Intel® AMT) 8.0 • Intel® Virtualization (Intel® VT) • Intel® Virtualization for Directed I/O (Intel® VT-d) • Intel® Trusted Execution Technology (Intel® TXT) • Intel® Identity Protection Technology (Intel® IPT) • Intel® Anti-Theft Technology (Intel® AT) • Trusted Platform Module (TPM) For information about Intel vPro Technology Refer to http://support.intel.com/support/vpro/ 1.11.1.1 Intel® Active Management Technology When used with third-party management and security applications, Intel Active Management Technology (Intel AMT) allows business owners and IT organizations to better discover, heal, and protect their networked computing assets. Some of the features of Intel AMT include: • Out-of-band (OOB) system access, to discover assets even while PCs are powered off • Remote trouble-shooting and recovery, which allows remote diagnosis and recovery of systems after OS failures • Hardware-based agent presence checking that automatically detects and alerts when critical software agents have been stopped or are missing • Proactive network defense, which uses filters to block incoming threats while isolating infected clients before they impact the network • Remote hardware and software asset tracking, helping to track computer assets and keep virus protection up-to-date 36

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Intel NUC D53427RKE Technical Product Specification
36
1.11
Intel
®
Security and Manageability
Technologies
Intel
®
Security and Manageability Technologies provides tools and resources to help
small business owners and IT organizations protect and manage their assets in a
business or institutional environment.
NOTE
Software with security and/or manageability capability is required to take advantage of
Intel platform security and/or management technologies.
1.11.1
Intel
®
vPro™ Technology
Intel
®
vPro™ Technology is a collection of platform capabilities that support enhanced
manageability, security, virtualization and power efficiency.
The key platform
capabilities include:
Intel
®
Active Management Technology (Intel
®
AMT) 8.0
Intel
®
Virtualization (Intel
®
VT)
Intel
®
Virtualization for Directed I/O (Intel
®
VT-d)
Intel
®
Trusted Execution Technology (Intel
®
TXT)
Intel
®
Identity Protection Technology (Intel
®
IPT)
Intel
®
Anti-Theft Technology (Intel
®
AT)
Trusted Platform Module (TPM)
For information about
Refer to
Intel vPro Technology
1.11.1.1
Intel
®
Active Management Technology
When used with third-party management and security applications, Intel Active
Management Technology (Intel AMT) allows business owners and IT organizations to
better discover, heal, and protect their networked computing assets.
Some of the features of Intel AMT include:
Out-of-band (OOB) system access, to discover assets even while PCs are
powered off
Remote trouble-shooting and recovery, which allows remote diagnosis and recovery
of systems after OS failures
Hardware-based agent presence checking that automatically detects and alerts
when critical software agents have been stopped or are missing
Proactive network defense, which uses filters to block incoming threats while
isolating infected clients before they impact the network
Remote hardware and software asset tracking, helping to track computer assets
and keep virus protection up-to-date