3rd Generation Intel
Core vPro Processor
The Business Case
               [Presenter:]
               [Title:]
               [Date:]
New IT Security Landscape
3
Built for Business. Engineered for Security.
3rd Generation Intel Core
vPro Processor
    Specifically designed for business
    Embedded security features
    Built-in client management
    Energy-efficient performance
    Innovative form factors
4
Addressing Top IT Security Needs
  Threat Management                                                                              Data Protection
   Prevents viruses and malware from entering your                                               Accelerates data encryption up to four times
    network with a protected launch environment                                                    faster1 without interfering with user productivity
   Guards against escalation-of-privilege attacks and                                            Generates higher-quality random numbers in
    keeps viruses from taking hold in your system                                                  encryption for safer online transactions
                                                                                                  Uses anti-theft technology to automatically
                                                                                                   disable itself if lost or stolen
  Identity and Access                                                                            Monitoring and Remediation
                         Data
   Protects access points        Protection
                           with hardware-based                                                    Remotely access and control any PC through all
    storage of tokens or certificates                                                              states, including reboot
   Prevents screen-scraping attacks with a secure                                                Proactively push security updates, and diagnose
    PIN pad that verifies human presence at the PC                                                 and repair after a breach has occurred
1 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests such as SYSmark* and MobileMark*
  are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult
  other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
5
Evolving Compute Models
Intel vPro Technology
for the Future
6
Energy-Efficient Performance
    Less Energy Consumption
     Improved performance per watt
     Remote shutdown after hours
     Powerful battery life
                                                       Saves
                                                       Energy
    Superior Integrated Graphics
     Optimized for content creation and consumption
                                                       and
     High-definition (HD) video                       Increases
                                                       Employee
                                                       Productivity
    Quick, Easy Access
     Powers on in less time
     Users get immediate access to data, network
7
Innovative Designs, Full Security
Users Get the Devices They Want with
No Compromise to Corporate Security
     All-in-One PCs
       Ideal for offices with limited space
       High performance, power efficiency
       Touch screen, multiuser capability
     Thin and Light Laptops
       Ideal for users on the go
       Easily portable yet sturdy
8
Strong Return on Investment
Improve IT Efficiency, Boost Security,
and Reduce Energy Consumption
    Remote Remediation            Improved Patching             Energy Savings
     Resolve support issues       Push patches to wired and    Reduce consumption
      quickly and reduce IT         wireless PCs at any time      with remote power
      travel costs                                                on/off capabilities
                                   Increase patching speed
     Reboot and reimage            and frequency to help        Improve and enforce
      PCs remotely, without         reduce costs                  support for power
      user intervention                                           management policies
                                   Proactively manage
     Simplify asset management     security updates             Reduce carbon emissions
9
Business Value of Upgrading
Wipro Consulting study estimates $5M annual savings for model
company with 1,700 desktops and 1,300 laptops by upgrading
to Intel Core vPro processors1
1 Wipro Consulting. Measuring the Value of Intel Core vPro Processor in the Enterprise (July 2011).
1
0
Legal Disclaimers
Intel may make changes to specifications and product descriptions at any time, without notice.
All products, dates, and figures specified are preliminary, based on current expectations, and are subject to change without notice.
Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests such as
SYSmark* and MobileMark* are measured using specific computer systems, components, software, operations, and functions. Any change to any of those
factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated
purchases, including the performance of that product when combined with other products. For more information, go to intel.com/performance.
Intel processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published
specifications. Current characterized errata are available on request.
Any code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for release. Customers,
licensees, and other third parties are not authorized by Intel to use code names in advertising, promotion, or marketing of any product or services, and any
such use of Intel's internal code names is at the sole risk of the user.
Intel product plans in this presentation do not constitute Intel plan-of-record product roadmaps. Please contact your Intel representative to obtain Intels
current plan-of-record product roadmaps.
Intel vPro technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration
of your hardware, software, and IT environment. To learn more, visit intel.com/technology/vpro/.
No computer system can provide absolute security under all conditions. Built-in security features may require third-party software, hardware, or services and
an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.
No computer system can provide absolute security under all conditions. Intel Trusted Execution Technology (Intel TXT) requires a computer with Intel
Virtualization Technology, an Intel TXTenabled processor, a chipset, a BIOS, Authenticated Code Modules, and an Intel TXTcompatible measured launched
environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit intel.com/technology/security.
Intel Virtualization Technology requires a computer system with an enabled Intel processor, a BIOS, and virtual machine monitor (VMM). Functionality,
performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating
systems. Consult your PC manufacturer. For more information, visit intel.com/go/virtualization.
No system can provide absolute security under all conditions. Intel Anti-Theft Technology requires an enabled chipset, a BIOS, firmware, software, and a
subscription with a capable service provider. Consult your system manufacturer and service provider for availability and functionality. Intel assumes no liability
for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit intel.com/go/anti-theft.
1
2
Legal Disclaimers (continued)
Security features enabled by Intel Active Management Technology (AMT) require an enabled chipset, network hardware and software, and a corporate network
connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power,
sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing
security frameworks, and modifications or implementation of new business processes. For more information, visit intel.com/technology/manage/iamt.
Material in this presentation is intended as product positioning and not approved end-user messaging.
This document contains information on products in the design phase of development.
This document is for informational purposes only. THIS DOCUMENT IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY
OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL,
SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license,
express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.
Copyright  2012, Intel Corporation. All rights reserved. Core Inside, Intel, the Intel logo, Intel Core, Intel Sponsors of Tomorrow., the Intel Sponsors of
Tomorrow. logo, Intel vPro, and vPro Inside are trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
1
3