Intel® Hardware Shield offers incredible hardware-based security
In today’s connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.
As the frequency, complexity, and severity of cyberattacks and network security attacks continue to rise, trust Intel® Hardware Shield to better protect your users and data. Included with Windows PCs built on Intel vPro®, this collection of security technologies helps defend against modern threats at each layer: hardware, BIOS/firmware, hypervisor, VMs, OS, and applications.
Below-the-OS security
Improve network and cyber security with active measures and unique out-of-the-box features exclusive to Intel® Hardware Shield, which includes advanced threat protections, application and data protections, and below-the-OS security.
Aimed at minimizing the risk of malware injection by using Intel® Hardware Shield to lock down memory in the BIOS when software is running and help prevent planted malware from compromising the OS. Help ensure your OS boots securely with Intel® Hardware Shield that offers many hardware-based security capabilities that support a secure boot, allowing your PCs to launch into a trusted state.
Application & data protections
Boost IT security for virtualized environments with Intel vPro® Enterprise for Windows OS, which extends hardware-rooted features to help protect user access credentials, workspaces, applications, and data in hardened enclaves.
Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel® Hardware Shield.
Accelerate virtualized security software like Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel-level malware and browser-based attacks. Complement virtualization with hardware-based encryption to help protect data at every layer.
Advance threat protections
Mitigate extreme network security attacks like control-flow hijacking, ransomware, and crypto mining. Software vendors like Chrome browser and Adobe use Intel® Control-Flow Enforcement Technology (Intel® CET) to help defend against attacks on system memory.
Help defend against ransomware and living-off-the-land-attacks with Intel® Threat Detection Technology (Intel® TDT). Unique to Intel, Intel® TDT augments existing software-only security solutions to help detect the latest threats with additional minimal impacts on user experience.
References: Intel® Hardware Shield – Intel vPro® Platform





