Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Beyond the Firewall and Thinking for Itself

September 22, 2008

Security Magazine’s Editor just ended an exclusive press conference with Intel about McCreary. Thei firm just introduced a third-generation vPro suite that should help CIOs and CSOs.

The new Intel vPro Technology (formerly codenamed “McCreary”) combines the energy-efficient performance of Intel® Core™2 quad-core or dual-core processors with the new Intel® Q45 Express Chipset and Intel® 82567LM Gigabit Network Connection along with Intel® Active Management technology 5.0.

Among the new business-class technology innovations, this 2008 version for the first time extends IT organizations’ reach to protect and manage PCs beyond the corporate firewall. With the new Remote Alert feature, a suddenly ailing PC – even one that is turned off – that is experiencing symptoms outside preset parameters can “call” for IT assistance on its own.

Using the new Remote Scheduled Maintenance feature, IT administrators can program PCs for regular tune-ups that have PCs automatically connecting to an IT management program for maintenance. With the new Fast Call for Help feature, the user can get immediate assistance over an out-of-band link by entering a key sequence, even if the computer is completely crippled with a failed operating system or hard drive.

“Intel vPro Technology has been a win-win for the IT industry and high-tech industries, and each year we’ve unveiled unique innovations to solve IT’s biggest challenges,” said Gregory Bryant, Intel vice president and general manager, Digital Office Platform Division. “For 2008, vPro Technology continues that trend, automating repair and maintenance functions to not only free IT professionals’ time, but rapidly accelerate the time it takes to get endusers up and running.”

In addition, for 2008 Intel beefed up access security with two new features. The new Access Monitor feature comprehensively and more securely logs IT activity on systems, further closing the door on potential internal security breaches. The platform also offers the first embedded technology to authenticate PCs using Microsoft* Network Access Protection,* enabling protected out-of-band remote maintenance on Intel vPro-based systems.

New Small-Business Solutions Added

For the first time, Intel has molded Intel vPro Technology in a form to specifically fit the needs of small businesses, those whose computer systems are likely managed by someone with no computer background at all. Designed for businesses with less than 25 notebooks or desktop PCs, Intel® IT Director offers a user-friendly “dashboard” that provides status on key system settings and health parameters, capability to block connection to risky USB devices and a data back-up feature that enables users to work seamlessly through hard-drive failures.

For small businesses which periodically need immediate help with PC problems, Intel unveiled Intel® Remote PC Assist Technology that connects those businesses with service providers that can assist when an end-user enters a key sequence. Once connected, service providers can take full advantage of the out-of-band capabilities, and security and management features of vPro Technology to solve problems remotely. For the service provider, Intel Remote PC Assist Technology means enhanced service delivery, reduced operational costs and broader access to customers. Initially, Intel Remote PC Assist will be available in North America.

Intel also introduced two motherboards supporting all of the new Intel® vPro features. Aimed at channel customers, the Intel® Desktop Board DQ45CB is for standard-sized PCs and the Intel® Desktop Board DQ45EK is for small- form-factor systems.

Creating New Computing Models for Security, Manageability

Many IT organizations are looking to new application delivery technologies to strengthen security, improve management and lower total cost of ownership. Dynamic Virtual Client technologies (DVC), Intel’s designation for a new group of computing models, work in conjunction with Intel vPro Technology to centralize data security and application management on a server, but “stream” applications on demand to a desktop or laptop PC where they run under the PCs own processing power. In this way, DVC preserves user mobility and performance, simplifies IT management and security, and, unlike thin-client models, does not require a large-scale burden on the datacenter. Citrix, Lenovo, and Microsoft recently announced DVC products or programs that take advantage of Intel vPro technology.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thinking Beyond the Template

    See More
  • Thinking Out of the Box for Stronger Security

    See More
  • key-enews

    The Insider Threat: Protecting Your Company from Itself

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing