List Price is Lenovo’s estimate of product value based on the industry data, including the prices at which first and third-party retailers and etailers have offered or valued the same or comparable products. Third-party reseller data may not be based on actual sales.
Est Value (Estimated Value)
Estimated value is Lenovo’s estimate of product value based on industry data, including the prices at which Lenovo and/or third-party retailers and e-tailers have offered or valued the same or comparable products. Third-party data may not be based on actual sales.
Show Price Breakdown
Hide Price Breakdown
See More Details
You may compare up to 4 products per product category (laptops, desktops, etc). Please de-select one to add another.
This Product has recently expired. Please contact your Lenovo Sales Representative to renew this item.
List Price Website
promotions and special offers are not valid on the site
The website is for business and institutional customers only
Contract pricing has expired. Please contact your Local Lenovo Sales.Rep
Added To Cart
Go to Cart
Customers who bought this item also bought
Structure and Roles
Lenovo’s leadership role as a technology company is based on the trust it continually strives to earn with customers and those in the wider security community. The Lenovo Product Security Office (PSO) mission is laser focused on the security of Lenovo’s devices and minimizing risks to exposures and vulnerabilities.
To successfully execute its mission, the Lenovo PSO brings together people with a variety of skills, including software coding and security; computer, mobile and network hardware; supply chain logistics, vulnerability testing, operations management, supplier interactions and external communications (including crisis or issue management).
Key security roles
Key security roles and Deliverables
Drive Product Offering Security Features & Models
Product architecture support
Quality, standards, tools
Sales & marketing support
Product Security Incident Response Team (PSIRT)
Drive closure of all security incidents
Customer & Internal communications
Maintain policies & procedures
Managed across Business Groups/Units
Supply Chain Security
Secure supplier base for intelligent components (Trusted supplier list)