Top Reasons to Standardize on 5th Gen Intel Core vPro

Top Reasons to Standardize on 5th Gen Intel Core vPro
Top Reasons to Standardize
on 5th Gen Intel® Core™ vPro™
Processor Family
Leading-edge security for an unwired workplace.
High-performing 5th gen Intel® Core™ vPro™ processor-based devices with built-in security features let you display and dock wirelessly.
Top Reasons to Standardize on 5th Gen Intel® Core™ vPro™ Processor Family
Meet the mobility needs of your users,
and the security requirements of your business
No compromise design delivers the right PC for any user
or business. Tablets, convertibles, detachables, Ultrabook,™
2 in 1, ultra-thin clamshells, and tiny desktop PCs, all
with high-performing, 14nm 5th gen Intel® Core™ vPro™
processors, featuring built-in security, manageability,
and wireless innovations to help transform the workplace.1
Stop searching for dongles and adapters, and start sharing
instantly with wireless display. Make every presentation
and conference room a cable-free zone with Intel® Pro
Wireless Display.2
Uninterrupted productivity ensures you are connected and
ready, the moment you walk up to your desk. Intel® Wireless
Gigabit Docking3 delivers wire-like performance for display,
keyboard/mouse, and USB accessories, all with a no
compromise wireless docking experience.
Protect your sensitive business information, wherever it
may go. With Intel® SSD Pro 2500 Series4 storage, all
your data is protected with built-in automatic encryption
capabilities. With ultra-fast data transfer and performance,
users can keep going without impacts to productivity.
Support for OPAL 2.0 ensures your storage investment
will be ready for new data protection capabilities such
as secure managed containers and digital fencing.
Wired, wireless, at your desk or on the go, device
management is always available no matter the device
type or location. With Intel® Active Management Technology,
IT has a powerful set of capabilities to discover, configure,
and proactively maintain the health of 5th gen Intel® Core™
vPro™ processor-based devices. Regardless of power or OS
state, IT can reach out and keep devices running and
employees productive.5
Hardware-strength protection meets up with usernames
and passwords. Keeping access to our most sensitive
information should come with all the necessary protections.
Adding hardware-strength protection to a multi-layer
security approach is exactly what Intel® Identity Protection
Technology delivers.6 While providing a method to enhance
existing solutions and an architecture for future innovation,
this powerful hardware benefit can strengthen your
authentication experience while removing the burdens
of requiring multiple complex passwords.
2
Top Reasons to Standardize on 5th Gen Intel® Core™ vPro™ Processor Family
IDENTITY
ANTI-MALWARE
• Enhance your multilayered security with
Intel® Identity Protection
Technology. Simple access
authentication with
hardware-strength for
added protection. Malware
screen scraping protection
plus presence proof.
RESILIENCY
• Maintain a safe boot
environment for virtual
machines with a hardwarebased root of trust using
Intel® Device Protection
technology with Trusted
Execution technology.7
• Help protect your PC BIOS
from stealth attacks and
unauthorized updates with
Intel Device Protection
technology with BIOS Guard.7
DATA PROTECTION4
• Manageability and
automation5 – Remotely
manage, automate update
services, and easily
diagnose, isolate, and
repair problems with
Intel® Active Management
technology,5 part of 5th
generation Intel Core
vPro processors.
• Protect data4 at work and
on the move with full disk
encryption using Intel®
SSD Pro Series drives—
designed to be easily
configured, managed,
and recovered by IT.
• Support for OPAL 2.0
delivers future benefits for
your storage investment.
New capabilities like secure
manage containers and
digital fencing, deliver new
methods for protecting
data while improving
user productivity.
• Enable ubiquitous enterprisegrade encryption without
slowing down productivity
using Intel® Data Protection
technology6 with Advanced
Encryption Standard – New
Instructions—hardwareenhanced cryptographic
acceleration built into
the processor.
• Safely generate highly secure
encryption keys using Intel
Data Protection technology8
with Secure Key built into
the processor.
Safeguard the enterprise, while users
display and dock without wires
3
Top Reasons to Standardize on 5th Gen Intel® Core™ vPro™ Processor Family
1
Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/
technology/vpro.
2
No computer can be absolute secure. Intel® Pro Wireless Display network security features require a system with an Intel® processor with vPro™ Technology, 1080p and Blu-Ray or other protected content playback, a compatible Intel® WiDi adapter
and media player, and supporting Intel® WiDi software and graphics driver installed. Check with your device manufacturer. Learn more by visiting www.intel.com/go/widi.
3
Intel technologies may require enabled hardware, specific software, or services activation. Check with your system manufacturer or retailer.
4
No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Solid State Drives may require additional software, hardware, services and/or an Internet connection. Results may vary
depending upon configuration. Consult your system manufacturer for more details.
5
Requires activation and a system with a corporate network connection, an Intel® AMT-enabled chipset, network hardware and software. For notebooks, Intel AMT may be unavailable or limited over a host OS-based VPN, when connecting wirelessly,
on battery power, sleeping, hibernating or powered off. Results dependent upon hardware, setup and configuration. For more information, visit Intel® Active Management Technology.
6
No computer system can provide absolute security. Requires an Intel® Identity Protection Technology-enabled system, including an enabled Intel® processor, enabled chipset, firmware, software, and Intel
integrated graphics (in some cases) and participating website/service. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com/.
Consult your system manufacturer and/or software vendor for more information.
7
No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, firmware, software and may require a subscription with a capable service provider (may not
be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more
information, visit http://www.intel.com/go/anti-theft. Consult your system manufacturer and/or software vendor for more information.
8
No computer system can provide absolute security. Requires an enabled Intel® processor and software optimized for use of the technology. Consult your system manufacturer and/or software vendor
for more information.
Discover more reasons to standardize on the 5th generation Intel® Core™ vPro™ processor family at www.intel.com/vpro
Copyright © 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, Look Inside, the Look Inside Logo, Intel Core, and Intel vPro are trademarks of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Printed in USA
1114/JSN/HBD/PDF
Please Recycle
327823-005US
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising