• <More on Intel.com

Built for Business. Engineered for Security.

The merger of brilliant form and business function

Built for Business. Engineered for Security.

Finally technology has caught up with your users’ expectations for style without compromising on your need for security and performance. Beautiful mobile and desktop designs based on the 3rd generation Intel® Core™ vPro™ processor deliver embedded security that helps to keep threats out, guards user identities and credentials, and protects data.1 If that wasn’t enough, this new generation processor is responsive to your users’ computing needs, while delivering the manageability you’ve come to expect from Intel® vPro™ technology.2 With the powerful combination of built-in security and intelligent performance, the only thing more amazing than a new PC based on the 3rd generation Intel® Core™ vPro™ processor is what your users will do with it.

Innovative New Business Designs

Desktop at podium

Dell OptiPlex 9010 All-in-One*

The Dell OptiPlex 9010 All-in-One* Premier business client desktop delivers enhanced productivity and collaboration in a flexible, stylish All-in-One form factor. To help IT save time, it features business-class control for efficient manageability and confident security.

Learn more >

Lenovo ThinkPad X1 Carbon Ultrabook

Lenovo ThinkPad X1* Carbon Ultrabook™

Introducing the ThinkPad X1* Carbon Ultrabook™ based on the Intel 3rd gen Intel® Core™ vPro™ processor. This beautiful 14” Ultrabook weighs in at less than 3 lbs, is 18mm thin, features carbon fiber for strength and durability, a rapid charge battery, and 3G support.

Learn more >

 

Man with Lenovo Tiny mosaic desktop

Lenovo ThinkCentre M92p Tiny*

Introducing ThinkCentre’s new "tiny desktop," the industry’s first one-liter Intel® Core™ vPro™ processor-based desktop.  Cool, quiet, and energy efficient, "Tiny" delivers great performance, integrated multiple monitor support, and flexible mounting options. 

Learn more >

No-Compromise Platform Features

Woman with laptop seated in atrium

Security

The 3rd generation Intel® Core™ vPro™ processor comes with embedded security that delivers unprecedented protection for your clients and business data.1 2 These distinctive built-in features are specially designed to address the key concerns of IT security management, from the threat of viruses and malware to secure access and data protection.

Learn more >

Man with laptop at desk overlooking city

Remote Management

With the out-of-band remote management controls embedded in the 3rd generation Intel® Core™ vPro™ processor, technicians can efficiently support remote PCs that are beyond the reach of traditional software management capabilities. IT staff can easily troubleshoot, diagnose, and correct errors on remote PCs using hardware-based remote controls.

Learn more >

Man at desktop

Performance

The 3rd generation Intel® Core™ vPro™ processor family delivers responsive performance that will wake your clients in a flash and adapt to your users’ needs. It also provides seamless protection of important business data by encrypting data up to four times faster—without slowing performance.3 4 5

Learn more >

Product and Performance Information

open

1. Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.

2. No computer system can provide absolute security under all conditions. Built-in security features may require third party software, hardware, or services, and an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.

3. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.

4. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. Results have been measured by Intel based on software, benchmark or other data of third parties and are provided for informational purposes only.  Any difference in system hardware or software design or configuration may affect actual performance.  Intel does not control or audit the design or implementation of third party data referenced in this document.  Intel encourages all of its customers to visit the websites of the referenced third parties or other sources to confirm whether the referenced data is accurate and reflects performance of systems available for purchase.

5. Cross-client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurations and performance test as follows: (Mobile) Comparing pre-production 3rd generation Intel® Core™ i5-3320M Processor (4T2C, 3MB cache, up to 3.20 GHz), Intel Reference Board, pre-production BIOS, Memory 8 GB (2x4 GB) Micron* PC3-12800, Hitachi* Travelstar 320 GB hard-disk drive, Intel® HD Graphics 4000, Driver pre-production 8.15.10.2616 , Chipset INF pre-production 9.3.0.1019. Intel® Core™2 Duo Processor P8600 (2T2C, 3M cache, 2.40 GHz, 1066 MHz FSB), HP* dv6, BIOS HP* vF.31, Memory 4 GB (2x2 GB) Micron* PC3-8500, Hitachi* 320 GB hard-disk drive, Mobile Intel® GM45 Chipset Family w/ integrated graphics Driver: 8.15.10.1749, Chipset INF 9.2.0.1030, Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601 (Desktop) Comparing pre-production 3rd generation Intel® Core™ i5-3450 Processor (4T4C, 6 MB cache, 3.1GHz base up to 3.5GHz), Intel® Desktop Board DH77KC, Memory 8 GB (2x4 GB) Micron* DDR3-1600, Seagate* 1 TB, Intel® HD Graphics 2500, Driver: 8.15.10.2616 (BIOS:vSLZ7510H.8 6A.0033.2011.1230.1146, Chipset INF 9.3.0.1019, Intel® Core™ 2 Duo E8400 (2C2T, 3.0GHz, 6MB cache), Memory 4 GB (2x2 GB) Micron* DDR2 800 MHz, Seagate* 1TB hard-disk drive, Intel® G45, Driver: 8.15.10.2189, BIOS:IDG4510H.86A.0135.2011.0225.1100, INF), Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601 Business productivity claims based on SYSmark* 2012, which is the mainstream office productivity, data/financial analysis, system management, media creation, 3D modeling, and web development benchmark tool used to characterize the performance of the business client. SYSmark 2012 features user-driven workloads and usage models developed by application experts. Multitasking claims based on PCMark* 7, a hardware performance benchmark for PCs running Microsoft Windows* 7, includes a collection of various single- and multi-threaded CPU, graphics, and HDD test sets with a focus on Windows* application tests. Encryption workload consists of SiSoftware Sandra* 2011—AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm. For more information go to http://www.intel.com/performance.