Connect with us

Hi, what are you looking for?


Endpoint Security

Intel Unveils vPro Security Enhancements for 12th Gen Core Processors

Intel on Thursday presented the vPro platform security enhancements introduced with the new 12th Gen Core processors, codenamed Alder Lake.

Intel on Thursday presented the vPro platform security enhancements introduced with the new 12th Gen Core processors, codenamed Alder Lake.

The Intel vPro platform is designed to provide enhanced performance, security, manageability and stability. The vPro security technologies can provide protection to hardware, firmware, the operating system and applications.

vPro for Intel 12th Gen Core processorsAccording to Intel, in the new vPro delivered with 12th Gen processors, the Hardware Shield feature, which provides protections against firmware-level attacks, is designed to further reduce the attack surface.

In addition, the Control Flow Enforcement Technology (CET) — introduced with 11th Gen Core mobile processors to prevent malicious code injections into applications executing in memory — is now available for desktop processors as well.

On the latest Intel processors, the Threat Detection Technology (TDT) has been upgraded with anomalous behavior detection.

TDT is designed to provide hardware-based ransomware detection capabilities. The new detector targets living-off-the-land and supply chain attacks by using artificial intelligence to profile good app behavior, and it alerts endpoint security software when anomalies are identified.

On Intel vPro Enterprise for Windows and Chrome, users will benefit from protection against physical attacks courtesy of Total Memory Encryption Multi-Key (TME-MK), which encrypts DRAM. On Chrome devices, Intel is also providing a Key Locker feature, which is designed to protect keys used by AES-NI encryption.

The Register reported this week that the new processors still don’t support Microsoft’s Pluton security processor. Microsoft said in 2020 that the new security chip for Windows PCs would be delivered through partnerships with Intel, AMD and Qualcomm. Some upcoming Lenovo ThinkPads with AMD processors will reportedly include Pluton, but it will be disabled by default.

Advertisement. Scroll to continue reading.

Related: Intel Improves Hardware Shield in New 10th Gen Core vPro Processors

Related: Intel Packs Ransomware Detection Directly Into vPro Platform

Related: New Security Tech in Intel CPUs Protects Systems Against Malware Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

The Zero Day Dilemma

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...