Dynabook Secured-Core PC

True Security meets
Integrated Performance

Dynabook has partnered Microsoft® to build the most secure Windows devices that keep your business data safe. The new class of Windows 10 Secured-core PCs offers deep integration between hardware and software, and features the most advanced Intel® CPUs available to deliver superior work performance & resilience against current and future cyber-threats.

Why does my business need a Secured-Core PC?

A Secured-core PC is a secure, modern Windows 10 Pro device that comes with integrated hardware, software, and identity protection fully enabled out-of-the-box.

Secured-core PCs are right for your business if it:

  • employs mobile workers who require access to business-critical information outside of the off ice space
  • is in a data-sensitive industry, such as healthcare or f inancial providers handling conf idential records and information
  • is a high prof ile industry prone to phishing and other attacks

Features that drive business performance

win-11
The Latest in Security Capabilities

Dynabook’s Secured-core PC protects the integrity of Windows and its boot process from advanced attacks at firmware level via an in-built Dynamic Root of Trust Measurement (DRTM) that transfers control from the CPU directly to the Windows hypervisor loader via a secured, measured handoff.

win-11
Strong Code Integrity

A Secured-core PC ensures code running within that trusted computing base runs with integrity and is not subject to outside exploit or attack. Secured-core PCs use policies enabled with Hypervisor Protected Code Integrity (HVCI) to check system software before it is loaded, and only start executables signed by approved authorities. HVCI also runs in the Virtualization-Based Security (VBS) to protect it from external attacks.

win-11
Mission-Critical Data Protection

Dynabook’s Portégé X30, Tecra X40 and Tecra X50 provide the highest level of protection against potential data loss by guarding against drive-by attacks that can cause information disclosure or malware through BitLocker Drive Encryption. External peripherals are blocked from starting and performing Kernel Direct Memory Access (DMA), only when the drivers for these peripherals support memory isolations.

win-11
Biometric Identity Verification for Protection

Passwords alone are not sufficient to protect your business data against theft and phishing attacks, Windows Hello is built into each Dynabook Secured-core PC to prevent user identity and credential-based attacks through a combination of biometric sensors and hardware-based credential storage.

*Trusted Platform
Module (TPM) 2.0

Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto processor that helps you with actions such as generating, storing, and limiting the use of cryptographic keys. Many TPMs include multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM.

**Virtualization-Based
Security (VBS)

Virtualization-Based Security, or VBS, uses hardware virtualization features to create and isolate a secure region of memory from the normal operating system. Windows can use this "virtual secure mode" to host a number of security solutions, providing them with greatly increased protection from vulnerabilities in the operating system, and preventing the use of malicious exploits which attempt to defeat protections.

***Hypervisor Protected
Code Integrity (HVCI)

A Virtualization-Based Security (VBS) solution which uses VBS to significantly strengthen code integrity policy enforcement. Kernel mode code integrity checks all kernel mode drivers and binaries before they're started and prevents unsigned drivers or system files from being loaded into system memory.