Eliminate an entire class of attacks with Intel® Control-Flow Enforcement Technology| Intel Business
1 936
34
Intel IT Center21.2 тыс
Опубликовано 11 января 2021, 22:59
Intel® Control-Flow Enforcement Technology, available on the 11th Gen Intel® Core™ mobile processors, provides comprehensive out-of-the-box security technology for preventing cyber attacks. With Intel® Control-Flow Enforcement Technology, our engineers have invented ground-breaking technology to help shut down an entire class of cyber attacks that have long evaded software-only solutions7. In this video, we take a close look at how this technology functions to prevent cyber attacks. Learn more at: intel.com/11thgenvpro
Notices & Disclaimers
(6) In thin & light Windows-based devices, based on unique features and testing by IOActive (commissioned by Intel; as of December 2020) comparing Intel® Hardware Shield security capabilities with corresponding technologies in an AMD Ryzen Pro 4750U-based system. Visit www.intel.com/11thgenvpro for details. Results may vary.
(7) Intel Control-flow Enforcement Technology (CET) is designed to help protect against jump/call-oriented programming(JOP/COP) attack methods and return-oriented programming (ROP) attack methods, malware known as memory safety issues and which comprise over half of ZDI-disclosed vulnerabilities. Visit intel.com/11thgenvpro for details. Results may vary.
(8) In thin & light Windows-based PCs, based on December 2020 IOActive study (commissioned by Intel) comparing malware detection by Intel 11th Gen Core vPro platform with Intel TDT and AMD Ryzen Pro 4750U-based system. Visit intel.com/11thgenvpro for details on Intel's industry-leading CPU behavior monitoring technology. Results may vary.
For workloads and configurations visit Intel.com/PerformanceIndex. Results may vary.
Intel technologies may require enabled hardware, software or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
© Intel Corporation. Intel, the Intel logo, Intel vPro and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the
property of others.
Subscribe now to Intel Business on YouTube: intel.ly/43XZh6J
About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business's WEBSITE: intel.ly/itcenter
Follow Intel Business on TWITTER: twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: linkedin.com/showcase/intel-bu...
Follow Intel Business on FACEBOOK: facebook.com/IntelBusiness
Eliminate an entire class of attacks with Intel® Control-Flow Enforcement Technology| Intel Business
youtube.com/intelbusiness
Notices & Disclaimers
(6) In thin & light Windows-based devices, based on unique features and testing by IOActive (commissioned by Intel; as of December 2020) comparing Intel® Hardware Shield security capabilities with corresponding technologies in an AMD Ryzen Pro 4750U-based system. Visit www.intel.com/11thgenvpro for details. Results may vary.
(7) Intel Control-flow Enforcement Technology (CET) is designed to help protect against jump/call-oriented programming(JOP/COP) attack methods and return-oriented programming (ROP) attack methods, malware known as memory safety issues and which comprise over half of ZDI-disclosed vulnerabilities. Visit intel.com/11thgenvpro for details. Results may vary.
(8) In thin & light Windows-based PCs, based on December 2020 IOActive study (commissioned by Intel) comparing malware detection by Intel 11th Gen Core vPro platform with Intel TDT and AMD Ryzen Pro 4750U-based system. Visit intel.com/11thgenvpro for details on Intel's industry-leading CPU behavior monitoring technology. Results may vary.
For workloads and configurations visit Intel.com/PerformanceIndex. Results may vary.
Intel technologies may require enabled hardware, software or service activation.
No product or component can be absolutely secure.
Your costs and results may vary.
© Intel Corporation. Intel, the Intel logo, Intel vPro and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the
property of others.
Subscribe now to Intel Business on YouTube: intel.ly/43XZh6J
About Intel Business:
Get all the IT info you need, right here. From data centers to devices, the Intel® Business Center has the resources, guidance, and expert insights you need to get your IT projects done right.
Connect with Intel Business:
Visit Intel Business's WEBSITE: intel.ly/itcenter
Follow Intel Business on TWITTER: twitter.com/IntelBusiness
Follow Intel Business on LINKEDIN: linkedin.com/showcase/intel-bu...
Follow Intel Business on FACEBOOK: facebook.com/IntelBusiness
Eliminate an entire class of attacks with Intel® Control-Flow Enforcement Technology| Intel Business
youtube.com/intelbusiness
Свежие видео
Случайные видео
The Era of Generative AI in Personal Computing, Adrian Macias,AMD Sr. Director AI Product Management