Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Intel Unveils vPro Security Enhancements for 12th Gen Core Processors

Intel on Thursday presented the vPro platform security enhancements introduced with the new 12th Gen Core processors, codenamed Alder Lake.

Intel on Thursday presented the vPro platform security enhancements introduced with the new 12th Gen Core processors, codenamed Alder Lake.

The Intel vPro platform is designed to provide enhanced performance, security, manageability and stability. The vPro security technologies can provide protection to hardware, firmware, the operating system and applications.

vPro for Intel 12th Gen Core processorsAccording to Intel, in the new vPro delivered with 12th Gen processors, the Hardware Shield feature, which provides protections against firmware-level attacks, is designed to further reduce the attack surface.

In addition, the Control Flow Enforcement Technology (CET) — introduced with 11th Gen Core mobile processors to prevent malicious code injections into applications executing in memory — is now available for desktop processors as well.

On the latest Intel processors, the Threat Detection Technology (TDT) has been upgraded with anomalous behavior detection.

TDT is designed to provide hardware-based ransomware detection capabilities. The new detector targets living-off-the-land and supply chain attacks by using artificial intelligence to profile good app behavior, and it alerts endpoint security software when anomalies are identified.

On Intel vPro Enterprise for Windows and Chrome, users will benefit from protection against physical attacks courtesy of Total Memory Encryption Multi-Key (TME-MK), which encrypts DRAM. On Chrome devices, Intel is also providing a Key Locker feature, which is designed to protect keys used by AES-NI encryption.

The Register reported this week that the new processors still don’t support Microsoft’s Pluton security processor. Microsoft said in 2020 that the new security chip for Windows PCs would be delivered through partnerships with Intel, AMD and Qualcomm. Some upcoming Lenovo ThinkPads with AMD processors will reportedly include Pluton, but it will be disabled by default.

Related: Intel Improves Hardware Shield in New 10th Gen Core vPro Processors

Advertisement. Scroll to continue reading.

Related: Intel Packs Ransomware Detection Directly Into vPro Platform

Related: New Security Tech in Intel CPUs Protects Systems Against Malware Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

The Zero Day Dilemma

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...