With the Intel® Authenticate Solution1, included in the Intel® vPro™ platform, users can log in fast without costly password resets, and IT teams can count on user identities and policies protected in a deep layer of silicon-based protection.
Misused and stolen user credentials cause 63 percent of data breaches2. That makes hardware-based identity protection one of the smartest ways to defend your business. When credential keys, tokens, and policies are processed in the chip, they're much more difficult to see or reach. The Intel® Authenticate Solution gives IT the confidence of hardening at least one factor and IT policies.
Mitigate risk by validating user identities with a combination of factors that are convenient for users and strong for IT: facial recognition, fingerprint, Bluetooth phone proximity, protected PIN, and logical location using Intel® Active Management Technology (Intel® AMT). Virtual smart cards and additional factors from OEMs and hardware partners give you even more choice to protect the latest Intel® Core™ vPro™ processor-based computers.
The Intel® Authenticate Solution integrates into existing network environments and management tools, including Microsoft System Center Configuration Manager (SCCM)*, Active Directory Group Policy Objects (GPO)* and McAfee® ePolicy Orchestrator® software. Using a simple, self-service enrollment tool for users, you can create and deploy customized, hardened policies that enforce user identity protection for access to the corporate domain, network, and VPN.
Tighten identity protection with the Intel® Authenticate Solution in the Intel® vPro™ platform.
Streamline productivity with the fast, responsive performance necessary for serious business compute. Get in front of threats with hardware-enhanced security and reduce IT operating costs with remote manageability.
Save time and reduce on-site support costs with remote discovery and recovery with Intel® Active Management Technology (Intel® AMT) – even in cases of power loss or OS failure.
Intel® Stable Image Platform Program (Intel® SIPP) enables a predictable transition from one technology generation to the next.
“The Intel® Authenticate Solution leverages an enterprise’s existing infrastructure and management tools combined with the unique ability to protect identities at the hardware layer versus software where the majority of breaches occur today. We expect enterprises to greatly benefit from this cost effective and smart approach to solve for the increasing security threats.” – John J. Minnick, senior director, Global Strategic Technology Partner Team, Atos, Inc.
“Intel® Authenticate Solution and Windows* 10 has the potential to reduce calls by over 60% at one of our largest outsourced contracts.” – Basha Pillay, vice president of workspace services, Dimension Data.
Le caratteristiche e i vantaggi delle tecnologie Intel® dipendono dalla configurazione di sistema e potrebbero richiedere hardware e software abilitati o l'attivazione di servizi. Le prestazioni variano in base alla configurazione di sistema. Nessun prodotto o componente è totalmente sicuro. Rivolgersi al produttore o al rivenditore del proprio sistema oppure consultare il sito Web https://www.intel.it.
2015 Data Breach Investigations Report (DBIR) di Verizon*, http://www.verizonenterprise.com/DBIR/2015/.