• <More on Intel.com

Intel® Anti-Theft Technology (Intel® AT)

Intel® Anti-Theft Technology helps guard against laptop theft with immediate shut down.


Fact: A laptop is stolen every 53 seconds, while 12,000 laptops disappear every week from U.S. airports alone. Of all lost laptops, 46% had confidential data and no encryption.

Intel® Anti-Theft Technology (Intel® AT) helps stop laptop theft by making computers useless to thieves with immediate shut down. And, if the stolen computer is recovered, all data can be quickly reactivated to full functionality.

Intel® AT not only helps protect the intellectual property of a company at the pre-boot level, but also allows for fast reinstatement of a laptop, without damage to information, should the laptop be recovered.

Intel® AT is available on select 2nd generation Intel® Core™ and 2nd generation Intel® Core™ vPro™ processor families-based laptops when activated with a service subscription from an Intel® AT-enabled service.

See laptops with Intel® AT >

See Intel® Anti-Theft Technology–enabled software services >

How Intel® Anti-Theft Technology works

Intel® Anti-Theft Technology (Intel® AT)

Because Intel® Anti-Theft Technology (Intel® AT) is built right into the processor of a laptop, it’s activated as soon as the machine is turned on—even before startup.

If a laptop is reported lost or stolen, your client can flag that computer. The next time the machine connects to the central server, a “poison pill” is activated, rendering the laptop completely inoperable.

Intel® AT works even without Internet access and, because it’s hardware based, it can’t be disabled by tampering.

See laptop security in action. Watch the demo >

Laptop security for business

Intel® AT allows you to offer your clients maximum flexibility and secure control of network assets. Since it is built-in at the processor level, the IT administrator has a range of options to help secure mobile assets, such as:

  • Access to encrypted data can be disabled by deleting essential elements of the cryptographic materials that are required to access the encrypted data on the hard drive.
  • The PC can be disabled using a “poison pill” to block the boot process, even if the boot order is changed or the hard drive is replaced or reformatted. Regardless of the PC’s state, the “poison pill” will be received.
  • A customizable “Theft Mode” message allows the IT administrator to send a message to whoever starts up the laptop to notify them that it has been reported stolen.
  • Excessive login attempts trigger PC disable after an administrator-defined number of failed attempts. At this point, the Intel® AT trigger is tripped and the system locks itself down.
  • Failure to check in with the central server can trigger PC disable when a check-in time is missed. The IT administrator can set system check-in intervals. Upon a missed check-in time, the system is locked down until the user or IT administrator reactivates the system.

Read more about the advantages of Intel® AT for business >

New Intel® AT features take advantage of 3G networks

You can now offer your clients use of Intel® Anti-Theft Technology through encrypted SMS messages over a 3G network to send a poison pill, remotely unlock a recovered laptop quickly, or direct the system to send location information (GPS coordinates) back to the central server:

  • Poison pill delivery via an encrypted SMS message over a 3G network. 3G connections can occur regardless of the state of the OS, via a direct hardware link between Intel® AT and the 3G module.
  • Remote unlock via an encrypted SMS message over a 3G network. This lets IT reactivate the laptop within minutes of recovering the PC.
  • Location beaconing. Intel® AT can now transmit GPS coordinates to the central server if the system is equipped with a supported 3G module.

IT Resources

White Paper: Intel® Anti-Theft Technology

Technology Brief for Intel® AT

IT@Intel Evaluation Brief

White Paper: Securing Healthcare Data