core™ vpro™ processor platform-based systems bridging the...

Post on 14-Jul-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

INTEL CONFIDENTIAL, FOR INTERNAL USE ONLY

Intel® Core™ vPro™ Processor Platform-based Systems

Bridging the Gap between needs of CIOs & End-users to Compute with Confidence

Jason Kennedy Director, Intel Architecture Group and

Intel Business Client Platforms Division

INTEL CONFIDENTIAL

GAP Between CIO and Users

Bridging the

Delivering time to

productivity via

automation

The flexibility to take advantage

of ongoing innovations in computing

Security without

compromising user

experience

2

INTEL CONFIDENTIAL 3

NO COMPROMISE

Computing

INTEL CONFIDENTIAL 4

PRIORITIES IT and User

INTEL CONFIDENTIAL 5

Building SECURITY into Every Layer

INTEL CONFIDENTIAL

Threat Management

Protected FOUR WAYS

Identity and Access

Data and Asset Protection

Monitoring and Remediation

6

INTEL CONFIDENTIAL 7

ePO Deep Command

INTEL CONFIDENTIAL 8

Management Beyond the

OS

INTEL CONFIDENTIAL

More Threats Demand Greater

SECURITY

9

INTEL CONFIDENTIAL

Intel Responds with

IPT with PKI

Intel® Identity Protection Technology

10

INTEL CONFIDENTIAL 11

AUTOMATING IT …Maximizing Efficiency

Intel Confidential

“Simplicity is the ultimate sophistication.” — Leonardo da Vinci

Easily Automate IT Business Processes

INTEL CONFIDENTIAL 13

WIN-WIN

Making Device Management a

INTEL CONFIDENTIAL

NEXT LEVEL Taking IT Support to the

14

VIDEO: ARROW Help Desk Solution Accenture Remote Resolution Online Workforce solution

Roy Vera

INTEL CONFIDENTIAL 15

SELF HELP Is Here

The Era of

INTEL CONFIDENTIAL

INNOVATION Takes Many Forms

16

INTEL CONFIDENTIAL

Business Intelligence for

through the

Democratization of Data

EVERYONE

17

INTEL CONFIDENTIAL 18

BIG DATA On the Desktop

INTEL CONFIDENTIAL 19

Consumer Designs, Business

SAVVY

INTEL CONFIDENTIAL 20

ALL IN ONE & uSFF Desktop Designs

Secure HD Video Conferencing − Optimized for Intel AES-NI (Corei5/i7)

− HD upscaling requires 4+ threads

Better than Phone Audio

Cost Savings Opportunities

Forrester TEI of Lync (http://go.microsoft.com/?linkid=9751775 )

3-Year Risk-Adjusted ROI Generated a NPV of ~$10M

Amplify IT Control, Reduce Costs, & Streamline Collaboration

vPro Form Factor Innovation Extends to Desktop… e.g. PC-Based Unified Communications

INTEL CONFIDENTIAL

Form Factors

MOBILE

22

INTEL CONFIDENTIAL 23

Ultra-Secure. Ultra-Sleek. ULTRABOOK™

The 3rd generation Intel® Core™ vPro™ processor-based Ultrabook™ is built for business and engineered for security.

INTEL CONFIDENTIAL

Security. Automation. Innovation.

24

INTEL CONFIDENTIAL

GAP

25

Between CIO and Users

Bridging the

INTEL CONFIDENTIAL

COMPUTING with Confidence

26

Intel Confidential

Intel® Identity Protection Technology

Intel® IPT with PKI

One-Time Password token built into chipset. Enables transparent 2-factor user authentication.

Determines trusted platform

Intel® IPT with Protected Transaction Display Protects PC display from malware scraping.

Proves human presence at PC. Great for transaction verification and ACH fraud prevention

PKI certificates authenticate User and Server to one another. Digitally sign documents and emails and

encrypt files and messages

Use Model Intel® IPT Technology

OTP PKI Protected Transaction Display

VPN X X X

Authentication X X X

Digital Signature X X

Encryption X X

Intel® IPT with OTP

top related