Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

New Intel Chips Pack Hardware Authentication Technology

Intel’s 6th Generation Intel Core™ vPro™ Processors Add Hardware-based Authentication Features

Intel’s 6th Generation Intel Core™ vPro™ Processors Add Hardware-based Authentication Features

Chip giant Intel Corporation has started shipping its 6th Generation Intel Core™ vPro™ processor family, which now features a hardware-enhanced multifactor authentication solution designed to strengthen identity protection.  

With many data breaches stemming from stolen user credentials, Intel is hoping to address the issue with new security technology the company calls Intel Authenticate.

The technology is a hardware-enhanced, multifactor authentication solution that strengthens identity protection on the PC, making it less vulnerable to identity and security credential attacks, the company said.

Intel Core vPro i7 Chip with AuthenticateDesigned to provide flexible policy configuration and enforcement, Intel Authenticate is compatible with popular IT policy management tools, including:

• Microsoft Active Directory and Group Policy

• Microsoft System Center Configuration Manager

• Microsoft Enterprise Mobility Suite

Advertisement. Scroll to continue reading.

• McAfee ePolicy Orchestrator

How Intel Authenticate Works

As the chip manufacturer explains, Intel Authenticate verifies identities by using a combination of up to three hardened factors at the same time: “something you know,” such as a personal identification number; “something you have,” including a mobile phone; and “something you are,” such as a fingerprint.

End users can combine these available factors, including phone proximity, to enable Network Access to log in to domains and VPNs, and “Walk-Away Lock”, which uses presence technology to lock a system when a user leaves their PC unattended.

“IT can choose from multiple hardened factors of authentication that are based on company policies, and no longer has to rely solely on employees remembering complicated passwords,” Intel said.

Manufacturers including Acer, Asus, Dell, Fujitsu, HP, Lenovo, Panasonic and Toshiba are all releasing enterprise-ready devices featuring the new Intel processors, Intel said, and Authenticate is compatible with Microsoft Windows 7, 8 and 10.

The technology is currently available as a preview.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.