Notebooks with Intel® Centrino® 2 with vPro™ technology and desktops with Intel® Core™2 processors with vPro™ technology are optimized to help IT better manage and protect your fleet of business PCs. Safeguarding your business from data loss and disruption, these desktop and notebook PCs deliver proactive and enhanced security and remote manageability even if the PC is off or the OS is inoperable,ą lowering IT management costs and reducing the need for deskside visits.²
Designed to unleash the benefits of business software, Intel vPro technology helps IT enhance fleet manageability by combining PCs with Intel vPro technology with top software management solutions from providers like Microsoft, Symantec, LANdesk, HP, and more. And with the exceptional energy-efficient performance of the latest hafnium-based 45nm Intel® Core™ microarchitecture, you'll have a robust foundation for Microsoft Windows Vista* along with future 64-bit and next-generation multithreaded software.
- Brochure: Take business PCs to the next level (PDF 1.74MB)
- Whitepaper: Intel® Centrino® 2 with vPro™ technology and Intel® Core™2 processor with vPro™ technology (PDF 2.32MB)
Mobilize your work force
Innovate on the go with robust security and manageability features, longer battery life, and faster wireless connections built into notebooks powered by Intel Centrino 2 with vPro technology.¹
Empower desktop manageability
Get groundbreaking security and manageability, industry-leading performance³ and energy-efficient performance in the desktop PCs with Intel Core 2 processor with vPro technology—Intel's best technology for business.
Revolutionary technologies optimized for business
Notebooks with Intel Centrino 2 with vPro technology and desktops with Intel Core 2 processor with vPro technology deliver unique, hardware-assisted technologies that help enable a revolutionary computing experience.
- Discover. With built-in manageability and posture authentication in Microsoft* network access protection (NAP) environments, IT can discover assets even while PCs are powered off.¹
- Diagnose. Reducing downtime by providing management capabilities even when the PC's OS is inoperable, end users can request help with a keystroke from inside or outside the firewall and IT can remotely isolate and recover systems
- Verify. Hardware-based agent presence checking proactively detects that software agents are running while missing agents are automatically detected and alerts are sent to the management console.
- Isolate. Proactively blocking incoming threats, these PCs contain infected clients before they impact the network while alerting IT when critical software agents are removed.
- Update. Help keep software and virus protection up-to-date with enabled third-party software to store version numbers or policy data in non-volatile memory for off-hours retrieval or updates.