We are sorry, eCoupon {0} {1} has been fully claimed
We are sorry, eCoupon {0} {1} has been fully claimed. Refresh and try when others quit.
{0} coupons left to claim
Compare
Added!
Build Your PC
View {0} Model
View {0} Models
Configure/Buy
Add To Cart
This model is configurable! Click Build Your PC to start configuring.
Earn Double Rewards
Earn Triple Rewards
4X Rewards
5X Rewards
Huge Rewards
Earn
 in Rewards
Double Rewards
JOIN MYLENOVO
REWARDS!!
• Earn & redeem rewards
• Engagement rewards
• Member exclusive offers
• Free to Join — Join now!
Coming Soon
New Options Available
Available Soon
READY TO SHIP
Price Match Guarantee
/shopping-faq/#payments
off
Save
Lenovo Outlet Price
Your price
List Price
List Price
List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Est Value:
Exclusive Price:
Starting at
Instant Savings
eCoupon Savings:  
Additional Savings
Show Price Breakdown
Hide Price Breakdown
Use eCoupon
Includes
Features
Key Details
Part Number
See More
See Less
 
Coming Soon
more
expanded
collapsed
See More Details
Great choice!
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
View Your Comparisons
One moment please...
Search on Lenovo.com Public Website
& Up
Shipping Options
Update Zip Code
Response Error
Input Format Error
Pts
FREE
Delivery options for {0}
Specs Text Link
Specs Teaser Content
Specs Teaser Link
Learn More
Show details
Hide details
view.more.details
Includes {qty} items
(Qty: {qty})
read more
Join Now!
OR
*Savings cannot be combined
Undecided?
Call our Sales Team at:
Mon-Fri 9am-5:30pm GMT
Save
Hide quote dialog
Sign in or Create an Account
Sign In
Email Address
Password
Not enrolled for rewards? Join Now
By joining, you agree to the Terms of Use and you are opting in to receive Lenovo marketing communications via email.
/rewards/terms/
Terms of Use
Remember me
Forgot your username or password?
Create an Account
You can store addresses, easily keep track of your orders and save items in your cart for later.
Create an Account to Save Your Cart
Create an Account
You can store addresses, easily keep track of your orders and save items in your cart for later.
The email format is incorrect, please try again
First Name
Maximum length is 50 characters
Last Name
Password must have at least
8-20 characters
Include two of the following: letters, numbers, and symbols($!#&)
Confirm Password
I agree to opt-in to Lenovo communications and I understand that my data will not be shared.
Yes, I have read and accepted the Terms of Use and Privacy Policy.
Please agree the terms and privacy policy
By joining, you agree to the Terms & Conditions and you are opting in to receive Lenovo marketing communications via email.
If you would like to earn rewards, you will need to check the join Rewards checkbox above. To create an account without earning Rewards, register below.
Register
Sorry, the Email you entered is incorrect
Sorry, the password you entered is incorrect

About Lenovo Product Security

 

Lenovo: Taking Action on Product Security

With the fast pace of product development and the constant threat from hackers, no manufacturer can guarantee that its products will be 100% free from vulnerabilities .  However, Lenovo understands that it must deliver products and solutions that not only have the functionality that customers want, but also provide the technology required to protect the confidentiality, integrity, and availability of their data.  To meet this challenge, Lenovo is continually working to protect our customers against constantly evolving security threats.

Accordingly, Lenovo has built a dedicated team of security professionals with expertise in the following areas:

  • Security Architecture - Drive technical compliance on product design and strategy
  • BIOS/Firmware/Application Security - Code review and authentication
  • Ethical Hacking - "White Hat" vulnerability testing
  • Supply Chain - Thorough security review of each supplier that provides components, assemblies, firmware, software and customer configuration
  • Customer Support - Address customer concerns and questions
  • Incident Response - Risk mitigation, and issue remediation
  • Project Management - Oversight of contract vendors, and managing implementation of programs
  • Customer Awareness - Communications of security incidents and strategy

We use this expertise to address security concerns across our products and services and are continually looking potential risks and how to resolve them. See how our team is structured here:

Lenovo’s product security management system is set up to drive security throughout the product life cycle, from development and manufacturing, to customer support - striving to ensure security is "built into" our products, not "bolted on."

  • Product security oversight, or governance, is integrated into this process to help ensure product development is following proper, secure processes, especially in the areas of BIOS and firmware creation and distribution.
  • From the initial planning of our products, we strive to incorporate the critical security features our customers need.
  • Throughout the development and test process, Lenovo’s ethical hacking program provides insight into potential customer issues so they can be fixed before shipment.
  • Ongoing training programs help ensure that key personnel are up to date on critical security issues and how to address them on specific products.

There is a stringent process for qualifying product suppliers, including supply capability and quality standards. Lenovo also evaluates each supplier’s full development and manufacturing process to help them identify and mitigate security risks. Suppliers are contractually obligated to meet Lenovo’s security requirements. Once qualified, suppliers are re-evaluated on a regular basis, requiring an ongoing effort to keep up to date with security technology and practices.

Lenovo aims to protect products throughout the supply chain. Key components are labeled to address the risk of counterfeiting. Critical parts are controlled by suppliers and are traceable throughout the assembly process. The
suppliers’ processes for loading firmware and software are thoroughly evaluated to minimize the possibility of malware being introduced into the product.  Finally, Lenovo uses secure packaging and product tracking techniques from shipment through delivery.

Lenovo’s work to ensure the security of its products and supply chain has been recognized by Chain Security, LLC, one of the leading security firms in the United States. This conclusion comes after almost three years of detailed study into Lenovo’s security processes, corporate governance and supplier programs. The result of this analysis is a 20-page Letter of Attestation in which Chain Security details their work with Lenovo, the changes and improvements Lenovo has made in the last two years and Chain Security’s conclusion that Lenovo “is likely ahead of the industry” in terms of these security processes.

Lenovo provides post-sale security support that includes:  1) software or firmware security updates, and 2) Replacement of designated parts. These processes are designed to protect the customer and help keep their products secure.

A critical part of the Lenovo Product Security Office is the Product Security Incident Response Team (PSIRT). No product is 100% immune to security threats and vulnerabilities, so Lenovo is committed to minimizing any risks or vulnerabilities that impact our products. Lenovo PSIRT works with others in the industry to discover and understand the latest vulnerabilities or threats that could pose a risk to Lenovo products, and then pushes fixes to address them.  Lenovo product security advisories can be seen here: https://support.lenovo.com/product_security/.  New vulnerabilities can be reported by contacting the Product Security Incident Response Team at psirt@lenovo.com.

The technology in our products has made Lenovo an industry leader. Lenovo knows and understands that it must continually earn the trust and confidence of our customers and those in the security community.  We recognize that we can always do better and are committed to pursuing and following industry best practices.

SHARE
Compare  ()
Cookies
Call
Need Help? Call :