Explore Barcelona 2023 Announcements VMware Workspace ONE Workspace ONE Unified Endpoint Management

Intel and VMware announce vulnerability management below the OS

We are back with more exciting developments to share from Intel and VMware Workspace ONE! Through our expanded partnership with Intel, telemetry data from Intel® Core™ processors will enable Workspace ONE Unified Endpoint Management (UEM) to capture insights on vulnerabilities below the operating system (OS) layer. This new integration will combine chip-level insights with Workspace ONE UEM’s automated remediation and reporting capabilities to drive enhanced endpoint security. 

Foundational vulnerabilities 

Securing the modern workforce is a constant challenge with cyber threats increasing in both frequency and complexity. At VMware Explore 2023 Las Vegas, our team discussed the importance of adopting a holistic approach to vulnerability management and the impact on an organization’s security posture. An effective vulnerability management platform offers not only breadth across OS platforms, but also depth from application and OS layers down to the firmware and hardware. Vulnerabilities found below the OS, or foundational vulnerabilities, are especially concerning because they go undetected by conventional vulnerability scans and can lead to potentially catastrophic consequences. 

Intel and VMware vulnerabilities management 

Intel offers a solution to produce and capture foundational vulnerability insights for Windows PCs with Intel Core processors (with or without Intel vPro®). With deep-level analysis and familiarity across PC manufacturers, Intel has the unique ability to interpret configuration data from endpoints and detect vulnerabilities not found by typical security scans. The data is matched against known foundational vulnerabilities and packaged into risk analyses with relevant context and detail for identification and remediation. 

Through our one-of-a-kind partnership with Intel, this enhanced telemetry down to the device level will help fuel the Workspace ONE vulnerability management and compliance engine. Workspace ONE will visualize insights for observability and actionable events, enabling customers to deploy a more robust endpoint security strategy that utilizes vulnerability management both above and below the OS layer. The added hardware insights not only give customers greater visibility into their device fleet but will also compile richer context to drive greater efficiency of vulnerability assessments and remediations.  

How to get started with the Intel Chip to Cloud beta 

The Intel Device Health cloud service will be available soon in the VMware Anywhere Workspace Early Access™ Program portal

If you’re an existing Early Access Program member, you can select the Intel Chip to Cloud beta in your user profile when it’s available. The beta program will include the vulnerability insights capabilities along with the Intel vPro Chip to Cloud integration. If you aren’t already a member, you can sign up here.  

Learn more at VMware Explore 2023 Barcelona 

There are opportunities at VMware Explore to learn more about the exciting work between Intel and VMware. The VMware Workspace ONE team will be hosting a session on vulnerability management, “Addressing the Risk Riddle: Managing Vulnerability, Exposure and Remediation [EUSB1597BCN],” on November 7, 2023, at 2:15 PM.

For more information about Intel and Workspace ONE, contact your Intel or VMware representatives. 

Bookmark the VMware End-User Computing Blog for the latest news on Workspace ONE. 


For more VMware Explore news, see our VMware Explore Barcelona 2023 Anywhere Workspace, Workspace ONE, and Horizon announcement overview and all the articles in our VMware Explore Barcelona category.


VMware makes no guarantee that services announced in preview or beta will become available at a future date. The information in this article is for informational purposes only and may not be incorporated into any contract. VMware, Explore, and Workspace ONE are registered trademarks or trademarks of VMware, Inc. and its subsidiaries in the United States and other jurisdictions. This article may contain hyperlinks to non-VMware websites that are created and maintained by third parties who are solely responsible for the content on such websites.