Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Beyond the Firewall and Thinking for Itself

September 22, 2008

Security Magazine’s Editor just ended an exclusive press conference with Intel about McCreary. Thei firm just introduced a third-generation vPro suite that should help CIOs and CSOs.

The new Intel vPro Technology (formerly codenamed “McCreary”) combines the energy-efficient performance of Intel® Core™2 quad-core or dual-core processors with the new Intel® Q45 Express Chipset and Intel® 82567LM Gigabit Network Connection along with Intel® Active Management technology 5.0.

Among the new business-class technology innovations, this 2008 version for the first time extends IT organizations’ reach to protect and manage PCs beyond the corporate firewall. With the new Remote Alert feature, a suddenly ailing PC – even one that is turned off – that is experiencing symptoms outside preset parameters can “call” for IT assistance on its own.

Using the new Remote Scheduled Maintenance feature, IT administrators can program PCs for regular tune-ups that have PCs automatically connecting to an IT management program for maintenance. With the new Fast Call for Help feature, the user can get immediate assistance over an out-of-band link by entering a key sequence, even if the computer is completely crippled with a failed operating system or hard drive.

“Intel vPro Technology has been a win-win for the IT industry and high-tech industries, and each year we’ve unveiled unique innovations to solve IT’s biggest challenges,” said Gregory Bryant, Intel vice president and general manager, Digital Office Platform Division. “For 2008, vPro Technology continues that trend, automating repair and maintenance functions to not only free IT professionals’ time, but rapidly accelerate the time it takes to get endusers up and running.”

In addition, for 2008 Intel beefed up access security with two new features. The new Access Monitor feature comprehensively and more securely logs IT activity on systems, further closing the door on potential internal security breaches. The platform also offers the first embedded technology to authenticate PCs using Microsoft* Network Access Protection,* enabling protected out-of-band remote maintenance on Intel vPro-based systems.

New Small-Business Solutions Added

For the first time, Intel has molded Intel vPro Technology in a form to specifically fit the needs of small businesses, those whose computer systems are likely managed by someone with no computer background at all. Designed for businesses with less than 25 notebooks or desktop PCs, Intel® IT Director offers a user-friendly “dashboard” that provides status on key system settings and health parameters, capability to block connection to risky USB devices and a data back-up feature that enables users to work seamlessly through hard-drive failures.

For small businesses which periodically need immediate help with PC problems, Intel unveiled Intel® Remote PC Assist Technology that connects those businesses with service providers that can assist when an end-user enters a key sequence. Once connected, service providers can take full advantage of the out-of-band capabilities, and security and management features of vPro Technology to solve problems remotely. For the service provider, Intel Remote PC Assist Technology means enhanced service delivery, reduced operational costs and broader access to customers. Initially, Intel Remote PC Assist will be available in North America.

Intel also introduced two motherboards supporting all of the new Intel® vPro features. Aimed at channel customers, the Intel® Desktop Board DQ45CB is for standard-sized PCs and the Intel® Desktop Board DQ45EK is for small- form-factor systems.

Creating New Computing Models for Security, Manageability

Many IT organizations are looking to new application delivery technologies to strengthen security, improve management and lower total cost of ownership. Dynamic Virtual Client technologies (DVC), Intel’s designation for a new group of computing models, work in conjunction with Intel vPro Technology to centralize data security and application management on a server, but “stream” applications on demand to a desktop or laptop PC where they run under the PCs own processing power. In this way, DVC preserves user mobility and performance, simplifies IT management and security, and, unlike thin-client models, does not require a large-scale burden on the datacenter. Citrix, Lenovo, and Microsoft recently announced DVC products or programs that take advantage of Intel vPro technology.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Thinking Beyond the Template

    See More
  • Thinking Out of the Box for Stronger Security

    See More
  • key-enews

    The Insider Threat: Protecting Your Company from Itself

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing