List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Show Price Breakdown
Hide Price Breakdown
See More Details
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
This Product has recently expired. Please contact your Lenovo Sales Representative to renew this item.
List Price Website
promotions and special offers are not valid on the site
The website is for business and institutional customers only
Contract pricing has expired. Please contact your Local Lenovo Sales.Rep
Added To Cart
Go to Cart
Customers who bought this item also bought
Product Security Program Governance
Underpinning its Product Security Program, Lenovo has in place a governance system with checks and balances to ensure processes and practices are consistently followed across the business. This governance system puts in place controls to ensure that security reviews are part of the product development and supply chain lifecycle processes. This governance system is outlined in the Lenovo Product Security Governance Documentation illustrated below:
(Identifies CPSO, Introduces Product Security Office and Intiatives)
Specific Programs, Standards, and Processes
Product Security Training Program
Supply Chain - Trusted Supplier Program
Software Security Program
Security Requirements and Standards
(Architecure, Design, & Test)
Product Team Governance Process
The Policy document is signed by the CEO, and stresses the importance of Product Security to all employees. The Program document is from the Chief Product Security Officer (CPSO) and introduces the work that implements Product Security processes. Finally, the actual Program, Standards, and Process documents relate to the specific work being done.
To ensure the effectiveness of the governance process, a training curriculum has been developed to educate and broaden employees’ understanding and knowledge regarding Lenovo’s approach to product security. The curriculum starts with a basic awareness of product security concepts and consists of three levels, with a certification achieved at the completion of each level: Security Basics, Software Security Associate, and Professional. The curriculum can be tailored to meet the needs of individual employees, dependent upon their job requirements. Security Basics are courses that can be taken by anyone to gain a good understanding of Product Security. The Associate and Professional levels are geared toward those with a software background, and lead to advanced secure software design concepts. There are additional courses beyond these that are available to further learning.
Lenovo’s work to ensure the security of its products and supply chain has been recognized by Chain Security, LLC, one of the leading security firms in the United States. This conclusion came after almost three years of detailed study into Lenovo’s security processes, corporate governance and supplier programs. The result of this analysis is a 20-page Letter of Attestation in which Chain Security details their work with Lenovo, the changes and improvements Lenovo implemented during the study, and Chain Security’s conclusion that Lenovo “is likely ahead of the industry” in terms of these security processes.