Intel® Hardware Shield, exclusive to the Intel vPro® platform, provides protections against firmware-level attacks.
Businesses today face increasing numbers and types of cyber threats, as formerly complex cyber-attack methods can now be performed by less-sophisticated actors with limited resources. Intel® Hardware Shield provides built-in security features to help organizations mitigate risks in this increasingly challenging threat landscape.
Endpoint Security Decisions Start at the PC
To fully protect PC endpoints, organizations need to evolve from traditional antivirus protections to virtualization-based security—but that's only half the story. In addition to software-based attacks, hackers have begun targeting firmware, which can serve as a conduit to system memory and the virtualization-based security environment. Organizations thus need fully integrated software and hardware solutions, which is where Intel® Hardware Shield comes in.
Features for a Stronger Security Foundation
Intel® Hardware Shield is the cornerstone of a more secure PC fleet, delivering protections against firmware attacks for increased platform protection. As part of the Intel vPro® platform, Intel® Hardware Shield helps ensure that the operating system runs on legitimate hardware. It also provides hardware-to-software security visibility, so the operating system can enforce a more complete security policy—all with no additional IT infrastructure required.
Expand Protections
Intel® Hardware Shield reinforces virtualization-based security (VBS) with hardware-based security features to protect computers at runtime. In addition, the below-the-operating system capabilities support a secure boot, allowing systems to launch into a trusted state.
Minimize Risks
Intel® Hardware Shield helps minimize the risk of malicious code injection by locking down memory in the BIOS when software is running to help prevent planted malware from compromising the operating system.
Increase Visibility
DRTM, a built-in feature of Intel® Hardware Shield helps ensure that operating systems are running on legitimate hardware and provides hardware-to-software security visibility. With added visibility into firmware security measures, businesses can more accurately assess the security of their systems.
Disclaimer