Home >  Outsmart attackers with a smarter security stack
Toggle Font Size

Continuous security is critical with devices connected everywhere in the work-from-anywhere era.


Amping up security is imperative as hybrid work expands network perimeters and the business risks associated with physical theft, data breaches, and cyberattacks continue to grow.1

In fact, cyberincidents now rank at the top of the Allianz Risk Barometer — ahead of supply chain disruptions, natural disasters, and the COVID-19 pandemic.2 And corporations experienced a 50% increase in cyberattacks overall in 2021. Attacks rose by up to 75% in the education/research and government/military sectors, and security experts report the healthcare sector, manufacturing, and small- to medium-sized businesses are among the most vulnerable organizations.3

The scope, scale, and cost of security incidents are expected to continue rising, according to the Cybersecurity & Infrastructure Security Agency (CISA). This federal agency attributes growth in cybercrime to international conflicts, political turmoil, and more malicious actors selling compromised data fraudulently.4

The hybrid IT challenge

According to Microsoft, cyberattacks afflict 83% of businesses, but only 29% of organizations are able to allocate sufficient resources to create end-to-end-security.5 Protecting the remote workforce and critical IT infrastructure takes a combination of continuous security throughout the device lifecycle and intrinsic security to integrate multiple layers of protection from the chip to the cloud.6

The latest innovations in security shield operating systems, simplify device configuration, automate security updates, and offer a new arsenal of integrated technology engineered to protect user identities, secure data, and stop physical theft — right out of the box.7

Security innovations protect users and assets

Advances in computer vision, artificial intelligence, and machine learning shield operating systems, defend vulnerable endpoints, and prevent unauthorized access to data.8 And the partnership between Microsoft and AMD is a great example of collaboration at work. They are working in tandem with original equipment manufacturers (OEMs) to shield the Windows 11 operating system and protect devices and users from sophisticated attacks.

The result is PCs that enhance the user experience and work right out of the box. For example, new devices can:

  • Shield the operating system from attacks. Processors built into the CPU provide security at the device core and guard against cyberattacks that take control of PCs by isolating the chip from the rest of the enterprise operating system. For instance, combining Microsoft’s Pluton security processor and the AMD Secure Processor (ASP) shields the Windows 11 operating system and provides chip-to-cloud protection for user identity, data, and applications. Hardware and firmware are also easier for IT teams to maintain with automated Windows updates from Microsoft.
  • Prevent unauthorized access to devices and data. Input/output (I/O) port access controls ensure the integrity of plug-ins that can be infected with malware. And advances in human presence detection (HPD), machine learning, and advanced computer vision use radar to sense motion. As a result, gaze detection can now distinguish between the user and other people, even when wearing face masks. The technology preserves battery life and protects users and devices by sending alerts and automatically blurring or locking display screens.
  • Guard against physical theft. Full system memory encryption protects data on lost or stolen PCs, and GPS tracking can identify the location of misplaced or stolen devices with Wi-Fi connectivity. Should a device end up in the wrong hands, AMD Shadow Stack detects and prevents control flow attacks, and AMD Memory Guard scrambles encryption keys stored in the system memory to secure data.
  • Protect user credentials and passwords. Embedding the Discrete Trusted Platform Module (dTPM 2.0) chip into the PC’s core ensures firmware and users are protected with password and security key encryption. The chip also supports features like Windows BitLocker Device Encryption that uses two or more authentication factors to protect hard drives, portal drives, and data on devices.8
  • Ensure devices boot securely and protect data. Advanced access controls and multifactor authentication systems also prevent unauthorized access to devices and data.

A security ecosystem protects the hybrid workforce

While intrinsic security integrates end-to-end protection from the chip to the cloud, continuous security automates security updates, monitors data and devices, and provides real-time operating system visibility and security alerts.

Smarter technology and multiple layers of protection establish a security ecosystem that enables IT professionals to deploy, monitor, and manage enterprise assets and critical IT infrastructure more efficiently and effectively.

Empower your people to outsmart cybercriminals

Security stacked from the chip to the cloud protects enterprise assets. Built-in security prevents disruptions, arming users with smarter technology to protect devices, data, and privacy — right out of the box.

Interested in learning more? See how Microsoft Pluton and AMD Ryzen 6000 Mobile processors are securing the new ThinkPad® Z Series. Contact your Lenovo Account Representative or local Business Partner or visit www.lenovo.com/thinkpad-z-series.