INTEL CONFIDENTIAL, FOR INTERNAL USE ONLY
Intel® Core™ vPro™ Processor Platform-based Systems
Bridging the Gap between needs of CIOs & End-users to Compute with Confidence
Jason Kennedy Director, Intel Architecture Group and
Intel Business Client Platforms Division
INTEL CONFIDENTIAL
GAP Between CIO and Users
Bridging the
Delivering time to
productivity via
automation
The flexibility to take advantage
of ongoing innovations in computing
Security without
compromising user
experience
2
INTEL CONFIDENTIAL 3
NO COMPROMISE
Computing
INTEL CONFIDENTIAL 4
PRIORITIES IT and User
INTEL CONFIDENTIAL 5
Building SECURITY into Every Layer
INTEL CONFIDENTIAL
Threat Management
Protected FOUR WAYS
Identity and Access
Data and Asset Protection
Monitoring and Remediation
6
INTEL CONFIDENTIAL 7
ePO Deep Command
INTEL CONFIDENTIAL 8
Management Beyond the
OS
INTEL CONFIDENTIAL
More Threats Demand Greater
SECURITY
9
INTEL CONFIDENTIAL
Intel Responds with
IPT with PKI
Intel® Identity Protection Technology
10
INTEL CONFIDENTIAL 11
AUTOMATING IT …Maximizing Efficiency
Intel Confidential
“Simplicity is the ultimate sophistication.” — Leonardo da Vinci
Easily Automate IT Business Processes
INTEL CONFIDENTIAL 13
WIN-WIN
Making Device Management a
INTEL CONFIDENTIAL
NEXT LEVEL Taking IT Support to the
14
VIDEO: ARROW Help Desk Solution Accenture Remote Resolution Online Workforce solution
Roy Vera
INTEL CONFIDENTIAL 15
SELF HELP Is Here
The Era of
INTEL CONFIDENTIAL
INNOVATION Takes Many Forms
16
INTEL CONFIDENTIAL
Business Intelligence for
through the
Democratization of Data
EVERYONE
17
INTEL CONFIDENTIAL 18
BIG DATA On the Desktop
INTEL CONFIDENTIAL 19
Consumer Designs, Business
SAVVY
INTEL CONFIDENTIAL 20
ALL IN ONE & uSFF Desktop Designs
Secure HD Video Conferencing − Optimized for Intel AES-NI (Corei5/i7)
− HD upscaling requires 4+ threads
Better than Phone Audio
Cost Savings Opportunities
Forrester TEI of Lync (http://go.microsoft.com/?linkid=9751775 )
3-Year Risk-Adjusted ROI Generated a NPV of ~$10M
Amplify IT Control, Reduce Costs, & Streamline Collaboration
vPro Form Factor Innovation Extends to Desktop… e.g. PC-Based Unified Communications
INTEL CONFIDENTIAL
Form Factors
MOBILE
22
INTEL CONFIDENTIAL 23
Ultra-Secure. Ultra-Sleek. ULTRABOOK™
The 3rd generation Intel® Core™ vPro™ processor-based Ultrabook™ is built for business and engineered for security.
INTEL CONFIDENTIAL
Security. Automation. Innovation.
24
INTEL CONFIDENTIAL
GAP
25
Between CIO and Users
Bridging the
INTEL CONFIDENTIAL
COMPUTING with Confidence
26
Intel Confidential
Intel® Identity Protection Technology
Intel® IPT with PKI
One-Time Password token built into chipset. Enables transparent 2-factor user authentication.
Determines trusted platform
Intel® IPT with Protected Transaction Display Protects PC display from malware scraping.
Proves human presence at PC. Great for transaction verification and ACH fraud prevention
PKI certificates authenticate User and Server to one another. Digitally sign documents and emails and
encrypt files and messages
Use Model Intel® IPT Technology
OTP PKI Protected Transaction Display
VPN X X X
Authentication X X X
Digital Signature X X
Encryption X X
Intel® IPT with OTP