Utimaco Supports IntelProUtimaco Supports IntelPro
Utimaco provides enterprise key and policy management for next-generation Intel vPro Technology
September 18, 2007

SAN FRANCISCO and OBERURSEL, Germany -- Utimaco – The Data Security Company, today announced at the Intel Developer Forum support for the next generation of Intel® vPro™ processor technology, will be made available in the second half of 2008. Under the cooperation, Utimaco SafeGuard® solutions will provide key and policy management for Intel’s hardware-based encryption technology, codenamed Danbury technology. Utimaco plans to integrate Danbury capabilities with SafeGuard data security functionalities, for enterprise-wide management of data encryption. "With the integration of Intel´s chipset-based technology under our management platform SafeGuard Enterprise, customers get the best of both worlds: Hardware-enabled encryption with enterprise-grade data security management,” said Malte Pollmann, Executive Vice President Products, Utimaco. “Working together, Utimaco and Intel are combating the dangers of unprotected data on mobile and desktop PCs.” Data breaches due to lost or stolen PCs pose an ongoing threat to the enterprise. Once deployed, Utimaco SafeGuard solutions not only ensure that no authorized user can access the protected device, read data from the device or use the device to enter the company network, but also ease the required management processes of security policies, encryption keys and multifactor authentication in medium to large enterprises. “Intel is providing solid data protection capabilities in its new vPro technology platforms. These new capabilities allow businesses to protect data and to more effectively manage systems with encrypted data," said Tom Quillin, Digital Office Ecosystem Enabling of Intel. "Intel will collaborate with Utimaco on delivering robust data protection, made easy-to-manage with Utimaco tools.” Utimaco Safeware AG
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023