New AMD Ryzen PRO 5000 G and GE Series Desktop Processors


AMD Ryzen PRO 5000 Series Desktop Processors: The G- and GE-Series of desktop processors, also launching today, bring leadership performance and the most modern security features to business-ready, enterprise-grade systems.

AMD Ryzen™ PRO Desktop Processors deliver modern performance, security features, and seamless management for the most demanding business environments. If your business requires power-efficient productivity, remote management of systems in-band and out-of-band, or if your business needs help protecting its sensitive data, Ryzen™ PRO Processors are for you.

Performance for Demanding Workloads

With up to 8 cores, AMD Ryzen™ PRO 5000 Series Desktop Processors enable businesses to crunch data or create content with ease. Power efficient, cool and quiet cutting-edge 7nm technology brings high performance to desktop PCs of all sizes – mini, small form factor, or tower.


AMD PRO Security

Through a modern, multi-layered approach to security, AMD Ryzen™ PRO Processors help businesses protect data, avoid downtime, and reduce resource drain:
  • AMD Ryzen™ Processor architecture is designed from the ground up with security features as a priority
  • AMD Shadow Stack offers hardware enabled protection against control-flow attacks - new with AMD Ryzen™ 5000 Series Desktop Processors and Ryzen™ PRO 5000 Series Desktop Processors
  • AMD Secure Processor integrated on-chip to help protect sensitive data
  • Exclusive to AMD Processors with PRO technologies, AMD Memory Guard provides real time encryption of system memory to help protect against physical attacks should your laptop be lost or stolen
  • Industry partnerships support multi-layered security features at the silicon, OS, and platform levels
  • Microsoft Secured-core PC helps enable a secure boot, can protect a device from firmware vulnerabilities, helps shield the operating system from attacks, and helps prevent unauthorized access to devices and data with advanced access controls and authentication systems

Read more: