{"id":278,"date":"2014-03-19T15:17:07","date_gmt":"2014-03-19T19:17:07","guid":{"rendered":"http:\/\/adsecurity.org\/?p=278"},"modified":"2014-09-16T22:01:08","modified_gmt":"2014-09-17T02:01:08","slug":"intel-vpro-technology-security","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=278","title":{"rendered":"Intel vPro Technology Security"},"content":{"rendered":"<p>In every modern (recent) Intel processor, there is a remote access<\/p>\n<p><a href=\"http:\/\/www.hardwaresecrets.com\/news\/Intel-Launches-Ivy-Bridge-CPUs-with-vPro-Technology\/6464\">Hardware Secrets posted<\/a>:<\/p>\n<blockquote><p>Intel\u2019s vPro technology provides IT managers with a collection of security and manageability features, including remote access to the PC independent of the state of the operating system or that of the computer\u2019s power. The newest vPro processors include an identity protection technology with public key infrastructure (Intel IPT with PKI), which provides a new second layer of authentication embedded into the PC that allows websites and business networks to validate that a legitimate user is logging on from a trusted PC by using a private key stored in a PC\u2019s firmware. In addition, the chipset has Intel\u2019s Secure Key, a hardware-based random number generator that businesses can use to encrypt applications, OS Guard malware detection and prevention technology, and McAfee ePolicy Orchestrator (ePO) Deep Command, which is designed to allow remote patching.<\/p><\/blockquote>\n<p><a href=\"http:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/vpro\/vpro-technology-general.html\">Intel\u2019s website provides more details<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In every modern (recent) Intel processor, there is a remote access Hardware Secrets posted: Intel\u2019s vPro technology provides IT managers with a collection of security and manageability features, including remote access to the PC independent of the state of the operating system or that of the computer\u2019s power. The newest vPro processors include an identity &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=278\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[109,110,111],"class_list":["post-278","post","type-post","status-publish","format-standard","hentry","category-technical-reading","tag-intelvpro","tag-processorsecurity","tag-remoteaccess","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=278"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":279,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions\/279"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}