A New Level of Built-in PC Security

Intel® Hardware Shield, now available on the 11th Gen Intel vPro® mobile platform, provides the highest performance and most comprehensive hardware-based security for business.1 2

Businesses face increasing numbers, types, complexity, and severity of cyberattacks. Intel® Hardware Shield, exclusive to the Intel vPro® platform, helps protect and defend against modern threats with defense in depth at each layer: hardware, BIOS/firmware, hypervisor, VMs, OS and applications.

Below-the-OS Security from Attacks at the Firmware and Hardware Levels

A Windows 10 Enterprise-based Intel vPro platform offers the unique capabilities of Intel Hardware Shield built-in to deliver the highest level of hardware, software and data protection right out of the box.

  • Minimize the risk of malicious code injection by using Intel Hardware Shield to lock down memory in the BIOS when software is running and help prevent planted malware from compromising the OS.
  • Help ensure your OS boots securely with Intel Hardware Shield that offers many hardware-based security capabilities that support a secure boot, allowing your PCs to launch into a trusted state.

Extend Protections of Your Applications and Data with Hardware-Accelerated Virtualization and Encryption

Enable hardware-based virtualization to help protect user access credentials, workspaces, applications and data in hardened enclaves.

  • Run virtual machines for security-based isolation with application compatibility across different operating systems running on the same PC with the many capabilities featured in Intel Hardware Shield.
  • Accelerate virtualized security software like Windows Defender Credential Guard and Application Guard with Intel virtualization capabilities to help protect against OS kernel-level malware and browser-based attacks.
  • Complement virtualization with hardware-based encryption to help protect data at every layer.

Help Detect and Respond to Advanced Threats

Mitigate extreme attacks like control-flow hijacking, ransomware, and crypto mining.

  • Software developers like Microsoft use Intel® Control-Flow Enforcement Technology (Intel® CET), part of Intel Hardware Shield, to help defend against attacks on system memory.
  • Defend against ransomware and malicious crypto mining with Intel® Threat Detection Technology (Intel® TDT), part of Intel Hardware Shield. Hardware-based threat detection to detect the latest threats such as crypto mining and ransomware without an impact on performance.

Built for Business Innovation

Transform computing endpoints into strategic corporate assets by selecting devices built on the Intel vPro® platform.


Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.

Información sobre productos y desempeño


En dispositivos ligeros y equipados en Windows, según las pruebas realizadas a partir del 1 de diciembre de 2020 en Intel® Core™ i7-1185G7 en los puntos de referencia del sector, las pruebas de la Guía de uso representativo y las características únicas, incluso en comparación con AMD Ryzen 7 Pro 4750U, en 3 usos clave: productividad, creación y colaboración, así como el estudio de IOActive de diciembre de 2020 (encargado por Intel) que compara las capacidades de seguridad de Intel® Hardware Shield con las tecnologías correspondientes en un AMD Ryzen Pro 4750U.


Para cargas de trabajo y configuraciones, visite www.Intel.la/PerformanceIndex. Los resultados pueden variar.