Intel® Authenticate: Get Unmatched Identity Protection

Deploy hardened multifactor identity protection with the Intel® Authenticate Solution, now supporting facial recognition. With the Intel® Authenticate Solution1, included in the Intel® vPro™ platform, users can log in fast without costly password resets, and IT teams can count on user identities and policies protected in a deep layer of silicon-based protection.

Take a Hardened Approach

Misused and stolen user credentials cause 63 percent of data breaches.2 That makes hardware-based identity protection one of the smartest ways to defend your business. When credential keys, tokens, and policies are processed in the chip, they're much more difficult to see or reach. The Intel® Authenticate Solution gives IT the confidence of hardening at least one factor and IT policies.

Choose a True Multifactor Solution

Mitigate risk by validating user identities with a combination of factors that are convenient for users and strong for IT: facial recognition, fingerprint, Bluetooth phone proximity, protected PIN, and logical location using Intel® Active Management Technology (Intel® AMT). Virtual smart cards and additional factors from OEMs and hardware partners give you even more choice to protect the latest Intel® Core™ vPro™ processor-based computers.

Make Security More Manageable

The Intel® Authenticate Solution integrates into existing network environments and management tools, including Microsoft System Center Configuration Manager (SCCM)*, Active Directory Group Policy Objects (GPO)* and McAfee® ePolicy Orchestrator® software. Using a simple, self-service enrollment tool for users, you can create and deploy customized, hardened policies that enforce user identity protection for access to the corporate domain, network, and VPN.

To learn more about how Intel® Authenticate and CDW can help your organisation get unmatched identity protection, please download the infographic, solution overview & solution brief below or contact CDW today.

Download Solution Overview

Download Solution Brief

Download Infographic

1. Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at https://www.intel.com.

2. The 2015 Data Breach Investigations Report (DBIR) by Verizon, http://www.verizonenterprise.com/DBIR/2015/.

Intel and CDW: In Partnership

Together Intel and CDW can help your organisation transform your IT, change the way users work and prepare for the future. For further information please click the button below.

Learn More

Explore Our Partners