Dynabook has partnered Microsoft® to build the most secure Windows devices that keep your business data safe. The new class of Windows 10 Secured-core PCs offers deep integration between hardware and software, and features the most advanced Intel® CPUs available to deliver superior work performance & resilience against current and future cyber-threats.
A Secured-core PC is a secure, modern Windows 10 Pro device that comes with integrated hardware, software, and identity protection fully enabled out-of-the-box.
Secured-core PCs are right for your business if it:
Dynabook’s Secured-core PC protects the integrity of Windows and its boot process from advanced attacks at firmware level via an in-built Dynamic Root of Trust Measurement (DRTM) that transfers control from the CPU directly to the Windows hypervisor loader via a secured, measured handoff.
A Secured-core PC ensures code running within that trusted computing base runs with integrity and is not subject to outside exploit or attack. Secured-core PCs use policies enabled with Hypervisor Protected Code Integrity (HVCI) to check system software before it is loaded, and only start executables signed by approved authorities. HVCI also runs in the Virtualization-Based Security (VBS) to protect it from external attacks.
Dynabook’s Portégé X30, Tecra X40 and Tecra X50 provide the highest level of protection against potential data loss by guarding against drive-by attacks that can cause information disclosure or malware through BitLocker Drive Encryption. External peripherals are blocked from starting and performing Kernel Direct Memory Access (DMA), only when the drivers for these peripherals support memory isolations.
Passwords alone are not sufficient to protect your business data against theft and phishing attacks, Windows Hello is built into each Dynabook Secured-core PC to prevent user identity and credential-based attacks through a combination of biometric sensors and hardware-based credential storage.
Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto processor that helps you with actions such as generating, storing, and limiting the use of cryptographic keys. Many TPMs include multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM.
Virtualization-Based Security, or VBS, uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system. Windows can use this "virtual secure mode" to host a number of security solutions, providing them with greatly increased protection from vulnerabilities in the operating system, and preventing the use of malicious exploits which attempt to defeat protections.
A Virtualization-Based Security (VBS) solution which uses VBS to significantly strengthen code integrity policy enforcement. Kernel mode code integrity checks all kernel mode drivers and binaries before they're started and prevents unsigned drivers or system files from being loaded into system memory.