List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Show Price Breakdown
Hide Price Breakdown
See More Details
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
With the fast pace of product development and the constant threat from hackers, no manufacturer can guarantee that its products will be 100% free from vulnerabilities . However, Lenovo understands that it must deliver products and solutions that not only have the functionality that customers want, but also provide the technology required to protect the confidentiality, integrity, and availability of their data. To meet this challenge, Lenovo is continually working to protect our customers against constantly evolving security threats.
Accordingly, Lenovo has built a dedicated team of security professionals with expertise in the following areas:
Security Architecture - Drive technical compliance on product design and strategy
BIOS/Firmware/Application Security - Code review and authentication
Supply Chain - Thorough security review of each supplier that provides components, assemblies, firmware, software and customer configuration
Customer Support - Address customer concerns and questions
Incident Response - Risk mitigation, and issue remediation
Project Management - Oversight of contract vendors, and managing implementation of programs
Customer Awareness - Communications of security incidents and strategy
We use this expertise to address security concerns across our products and services and are continually looking potential risks and how to resolve them. See how our team is structured here:
Lenovo’s product security management system is set up to drive security throughout the product life cycle, from development and manufacturing, to customer support - striving to ensure security is "built into" our products, not "bolted on."
Product security oversight, or governance, is integrated into this process to help ensure product development is following proper, secure processes, especially in the areas of BIOS and firmware creation and distribution.
From the initial planning of our products, we strive to incorporate the critical security features our customers need.
Throughout the development and test process, Lenovo’s ethical hacking program provides insight into potential customer issues so they can be fixed before shipment.
Ongoing training programs help ensure that key personnel are up to date on critical security issues and how to address them on specific products.
There is a stringent process for qualifying product suppliers, including supply capability and quality standards. Lenovo also evaluates each supplier’s full development and manufacturing process to help them identify and mitigate security risks. Suppliers are contractually obligated to meet Lenovo’s security requirements. Once qualified, suppliers are re-evaluated on a regular basis, requiring an ongoing effort to keep up to date with security technology and practices.
Lenovo aims to protect products throughout the supply chain. Key components are labeled to address the risk of counterfeiting. Critical parts are controlled by suppliers and are traceable throughout the assembly process. The suppliers’ processes for loading firmware and software are thoroughly evaluated to minimize the possibility of malware being introduced into the product. Finally, Lenovo uses secure packaging and product tracking techniques from shipment through delivery.
Lenovo’s work to ensure the security of its products and supply chain has been recognized by Chain Security, LLC, one of the leading security firms in the United States. This conclusion comes after almost three years of detailed study into Lenovo’s security processes, corporate governance and supplier programs. The result of this analysis is a 20-page Letter of Attestation in which Chain Security details their work with Lenovo, the changes and improvements Lenovo has made in the last two years and Chain Security’s conclusion that Lenovo “is likely ahead of the industry” in terms of these security processes.
Lenovo provides post-sale security support that includes: 1) software or firmware security updates, and 2) Replacement of designated parts. These processes are designed to protect the customer and help keep their products secure.
A critical part of the Lenovo Product Security Office is the Product Security Incident Response Team (PSIRT). No product is 100% immune to security threats and vulnerabilities, so Lenovo is committed to minimizing any risks or vulnerabilities that impact our products. Lenovo PSIRT works with others in the industry to discover and understand the latest vulnerabilities or threats that could pose a risk to Lenovo products, and then pushes fixes to address them. Lenovo product security advisories can be seen here: https://support.lenovo.com/product_security/. New vulnerabilities can be reported by contacting the Product Security Incident Response Team at email@example.com.
The technology in our products has made Lenovo an industry leader. Lenovo knows and understands that it must continually earn the trust and confidence of our customers and those in the security community. We recognize that we can always do better and are committed to pursuing and following industry best practices.