x
Toshiba

You are now leaving this site and being redirected to our partner CDW to complete your purchase.

Cancel Continue

Disclaimer: You are being redirected to a partner site to complete your purchase. Toshiba is not responsible for the content or policies of linked third party websites so please read those policies closely, including privacy and security policies. If you have any questions or concerns about the products and services offered on linked third party websites, please contact the third party directly.

Toshiba

You are being redirected to a partner site to complete your purchase. Toshiba is not responsible for the content or policies of linked third party websites so please read those policies closely, including privacy and security policies. If you have any questions or concerns about the products and services offered on linked third party websites, please contact the third party directly.

Toshiba

The product chosen for purchase is no longer available. Check out our other business-class laptops that can meet your business needs.

Toshiba

We’re sorry. There was a problem transferring your shopping bag items to CDW.

Cancel Try Again

Disclaimer: You are being redirected to a partner site to complete your purchase. Toshiba is not responsible for the content or policies of linked third party websites so please read those policies closely, including privacy and security policies. If you have any questions or concerns about the products and services offered on linked third party websites, please contact the third party directly.

Toshiba

We’re sorry, the items in your shopping bag are currently unavailable from CDW.

ok

Disclaimer: You are being redirected to a partner site to complete your purchase. Toshiba is not responsible for the content or policies of linked third party websites so please read those policies closely, including privacy and security policies. If you have any questions or concerns about the products and services offered on linked third party websites, please contact the third party directly.

dynabook
+
Notice

Dynabook, Inc. and its subsidiaries were deconsolidated from Toshiba Group on October 1, 2018.

They will continue to develop, manufacture, sell, support and service PCs and system solutions products for global markets.

For information on products and services, please see the following site.

CLOSE
Dynabook Secured-Core PC
Next-level hardware, software
and identity protection
Dynabook has partnered with Microsoft to build the most secure Windows devices available
today. The new class of Windows 10 Secured-core PCs are designed with deep integration
between hardware and software, and feature the most advanced Intel® CPUs available to
ensure resistance to current and future cyber-threats.
What is a Secured-Core PC?
A Secured-core PC is a secure, modern Windows 10 Pro device that comes with integrated hardware, software, and identity protection fully enabled out-of-the-box. Secured-core PCs are intended to handle mission-critical data and protect workers in some of the most data-sensitive industries, such as
healthcare providers handling medical records and other personally identifiable information (PII), high profile industries targeted for phishing and other attacks, and businesses that employ mobile workers who require access to business-critical information outside of the office.
Dynabook's Secured-Core PCs
Portégé® X30
Learn More
Tecra® X40
Learn More
Tecra® X50
>
Learn More
Features
Modern Security Capabilities
Relying on the advanced security capabilities built into modern CPUs, Dynabook’s Secured-core PC protects the integrity of Windows and its boot process from advanced attacks at the firmware level. Our Secured-Core PCs all use Dynamic Root of Trust Measurement (DRTM)* to launch the system into a trusted state by transferring control from the CPU directly to the Windows hypervisor loader via a secured and measured handoff.
Strong Code Integrity
Along with ensuring a small trusted computing base by establishing a hardware root of trust, a Secured-core PC ensures that code running within that trusted computing base runs with integrity and is not subject to outside exploit or attack. Secured-core PCs use policies enabled with Hypervisor Protected Code Integrity (HVCI)** to check system software before it is loaded, and only start executables that are signed by known, approved authorities. HVCI runs in the Virtualization-Based Security (VBS)***, which protects it from outside attack.
Mission-Critical Data Protection
As Secured-core PCs, Dynabook’s Portégé X30, Tecra X40 and Tecra X50, provide the highest level of protection against potential data loss by guarding against drive-by attacks that can lead to the disclosure of sensitive information or injection of malware. Secured-core PCs block external peripherals from starting and performing Kernel Direct Memory Access (DMA) only when the drivers for these peripherals support memory isolations. In addition, Dynabook Secured-core PCs use BitLocker Drive Encryption to help protect user data.
Identity Verification and Protection
Passwords alone often don’t sufficiently protect system data and identities. To ensure the data’s safety against theft, compromise and phishing attacks, Dynabook’s Secured-core PCs use Windows Hello to prevent user identity and credential-based attacks through a combination of biometric sensors and hardware-based credential storage.
*Trusted Platform
Module (TPM) 2.0
Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related
functions. A TPM chip is a secure crypto processor that helps you with actions such as generating, storing,
and limiting the use of cryptographic keys. Many TPMs include multiple physical security mechanisms to
make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM.
**Virtualization-Based
Security (VBS)
Virtualization-Based Security, or VBS, uses hardware virtualization features to create and isolate a secure
region of memory from the normal operating system. Windows can use this "virtual secure mode" to host a
number of security solutions, providing them with greatly increased protection from vulnerabilities in the
operating system, and preventing the use of malicious exploits which attempt to defeat protections.
***Hypervisor Protected
Code Integrity (HVCI)
A Virtualization-Based Security (VBS) solution which uses VBS to significantly strengthen code integrity
policy enforcement. Kernel mode code integrity checks all kernel mode drivers and binaries before they're
started and prevents unsigned drivers or system files from being loaded into system memory.