I hope you’ll share my enthusiasm for the exceptional1 performance of computers with 8th Gen Intel® Core™ processors. The excitement of a new PC still never fades with me – and the enhanced entertainment and productivity capabilities with the 8th Gen Intel Core processors are just stunning. However, there’s another vector of computing that carries increasing meaning to buyers of all types – and that is security. You have seen and you will continue to see Intel deliver security innovation, built in, and never more so than with this platform announcement2.
Security Made Simple
The connected world offers terrific online benefits and value, but you need security that’s simple and easy to use. Browsing and shopping online require security precautions. The good news is that new computers with 8th Gen Intel Core processors build security into your online life — without extra hassle. The 8th Gen Intel Core processor delivers built-in security2 for a layer of protection that makes logins, browsing, and online payments safer2 and simpler than ever before.
8th Gen Intel Core processor brings new innovation to help protect your daily digital activities. For example, you can securely store your personal data and auto-fill information using one master password using free password managers from Dashlane, 1Password, and Sticky Password, and your master password is protected by Intel® Software Guard Extensions (Intel® SGX).
You can also be rest-assured with an automatic layer of protection built in to your new computer’s hardware powered by Intel® Online Connect. Built-in second factor authentication will help keep your information safer without slowing you down—and even better, it works on any FIDO-compliant website such as Google, Facebook, Dropbox, Duo, Dashlane, or Digidentity.
While shopping with your new 8th Gen computer, convenient built-in fingerprint recognition lowers your risk of credit card theft— online shopping with a swipe of a finger will give you a quick1, secure checkout using payment providers such as PayPal and China UnionPay. You’ll have peace of mind knowing you’re protected without the extra hassle.
How Intel Delivers Built-In Security
The traditional model of “software protecting software” no longer protects us against modern threats. Intel’s hardware-based approach establishes the root of trust to better secure every layer of the compute stack (hardware, BIOS, firmware, operating systems, applications, networks, and the cloud).
To protect against modern and evolving attacks, Intel drives consistent capabilities across our products for integrity, reliability, and recoverability. These include secure boot, hardware and software ID, Intel® Rapid Storage Technology, and a trusted execution environment. Intel helps to simplify security for tens of thousands of hardware, software, and service providers, as well as billions of end users. Our unique position in the ecosystem, designing and protecting the hardware root of trust, benefits consumers and businesses end-to-end, as they connect their smart devices from the edge to the cloud.
Hardware, software, and service providers use Intel® hardware-enabled security capabilities together with Intel® software solutions, toolkits, and libraries to mitigate cybersecurity risks, reduce total cost of ownership (TCO), and improve overall productivity/usability. We align Intel software and hardware priorities to drive complete, usable, and highly effective solutions for users, whether delivered through partners or from Intel directly. Our objective is to dramatically improve protection by coupling the flexibility of software with the power of silicon in ways that only Intel can.
Now you can see why I’m so enthusiastic about the exceptional performance and built-in security of new computers with 8th Gen Intel Core processors. Intel hardware-based security coupled with the best software is the right choice for today’s security demands. Just imagine what the future holds – Intel will continue to push the boundaries of cyber security protection in ways that other companies simply cannot.
Click the link to learn more about how Intel® hardware-enabled security unleashes the power of silicon and the power of the ecosystem to protect our digital world.
# # #
*Intel, the logo, and Core are trademarks or registered trademarks of Intel Corporation. Other names may be claimed as property by others.2 Intel® technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer or retailer.
1 Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information, go to www.intel.com/benchmarks.
2 Intel® technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer or retailer.