4th Generation Intel Core vpro Processor Family Overview

Similar documents
2nd to 4th Generation Intel Core vpro Processor Family

Enterprise-Ready Security for Business Clients with Intel Processors

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

3rd to 5th Generation Intel Core vpro Processor Family

Intel Identity Protection Technology (IPT)

Crimeware Protection: 3rd Generation Intel Core vpro Processors

Intel Embedded Virtualization Manager

CLOUD SECURITY: Secure Your Infrastructure

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

How To Get A Client Side Virtualization Solution For Your Financial Services Business

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

How To Get A New Computer For Your Business

with PKI Use Case Guide

McAfee epolicy Orchestrator * Deep Command *

PC Solutions That Mean Business

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

Healthcare Security: User Experience, Compliance, and Risk

Intel vpro Technology. Common-Use Guide. For the Kaseya IT Automation Platform* Introduction

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Fast, Low-Overhead Encryption for Apache Hadoop*

ASF: Standards-based Systems Management. Providing remote access and manageability in OS-absent environments

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Intel vpro Technology Module for Microsoft* Windows PowerShell*

Intel Remote Configuration Certificate Utility Frequently Asked Questions

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.

Intel Management Engine BIOS Extension (Intel MEBX) User s Guide

This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.

Intel System Event Log (SEL) Viewer Utility

Citrix and Intel Deliver Client Virtualization

Intel Service Assurance Administrator. Product Overview

Hardware-Enhanced Security. Change Your Security Paradigm to Enable Business while Reducing Risks and Costs

PLANNING GUIDE Modern Collaborative Technologies

Intel Solid-State Drive Pro 2500 Series Opal* Compatibility Guide

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration

Deeper Levels of Security with Intel Identity Protection Technology

Security in the Cloud

Solution Recipe: Improve Networked PC Security with Intel vpro Technology

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Trusted Platforms Overview

Intel AMT Provides Out-of-Band Remote Manageability for Digital Security Surveillance

Intel Management and Security Status Application

Two Trends and a Paradox

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

WHITE PAPER. Mobile Document Management. with eakte2go*

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server

Revision History. Revision Revision History Date

New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers

Imagine What Fitness Can Look Like in the Future

Intel Unite Solution. Standalone User Guide

User Experience Reference Design

Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms

HP Desktop Mini: The Next-Generation in Business Desktop PCs

Intel Media SDK Library Distribution and Dispatching Process

Hardware + Software Solutions for The Best in Client Management & Security. Malcolm Hay Intel Technology Manager

Enabling Deskside Manageability and Productivity. The CompuCom EUC Workbench Powered by Intel vpro Technology

Intel Data Migration Software

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Intel Compute Stick STCK1A32WFC User Guide. Intel Compute Stick STCK1A32WFC

Remote control/problem resolution

Intel System Event Log (SEL) Viewer Utility

Remote Control/Problem Resolution

Windows Embedded Security and Surveillance Solutions

What is a Managed Service Provider (MSP)? What is the best solution for an MSP?

Intel Matrix Storage Console

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Intel System Event Log (SEL) Viewer Utility

Cloud based Holdfast Electronic Sports Game Platform

Intel RAID Controllers

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Windows 7, Enterprise Desktop Support Technician

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

UPGRADE THE WAY YOU WORK

Specification Update. January 2014

Supporting the Alert Standards Format (ASF) 2.0 Specification

Intel Virtualization Technology (VT) in Converged Application Platforms

Intel Extreme Memory Profile (Intel XMP) DDR3 Technology

LOOKING FOR AN AMAZING PROCESSOR. Product Brief 6th Gen Intel Core Processors for Desktops: S-series

Managed Service Plans

Intel 810 and 815 Chipset Family Dynamic Video Memory Technology

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

Evaluating Thin-Client Security in a Changing Threat Landscape

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Intel Small Business Advantage (Intel SBA) Release Notes for OEMs

Secure Mobile. Mark Blatt MD Global HealthCare Strategy Intel Corporation January 2011

Intel System Event Log (SEL) Viewer Utility. User Guide SELViewer Version 10.0 /11.0 December 2012 Document number: G

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Lenovo Miix 2 8. User Guide. Read the safety notices and important tips in the included manuals before using your computer.

Software Solutions for Multi-Display Setups

Intel Centrino 2 with vpro Technology and Intel Core 2 Processor with vpro Technology

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel X38 Express Chipset Memory Technology and Configuration Guide

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors

Transcription:

White Paper 4th Generation Intel Core vpro Processor Family 4th Generation Intel Core vpro Processor Family Overview Enterprise-Ready Security. User-Ready Performance. Executive Summary Today s enterprises demand a lot from their business PCs. To maintain competitive productivity and agility requires instant access and response with a wide range of methods to communicate securely. Yet companies are very aware of the growing, targeted attacks and persistent threats making their way around the globe and into a PC in their own back yards. Performance and protection are top-of-mind in enterprise IT departments. Business clients based on 4th generation Intel Core vpro processors are built for the needs of business and engineered to help protect their data with new levels of performance and unprecedented embedded security technologies combined into a single high-performance, secure business tool. A host of silicon-based technologies within the 4th generation Intel Core vpro processor family make this possible. This paper surveys those technologies and the benefits they bring to today s demanding, agile enterprises.

Table of Contents Executive Summary...1 Business Productivity, Security, and Manageability by Design...2 Business Productivity...3 Embedded, Hardware-Assisted Security..................... 4 Identity and Access Protection...5 Data Protection...5 Manageability and Automation...6 Ready for Windows 8*...7 The Ultimate in Enterprise Security and Productivity for Business............................... 7 Business Productivity, Security, and Manageability by Design Staying competitive means staying productive and protecting identities and corporate data from threats. To help the enterprise keep its edge, business users need to stay innovative and productive, in the office and on the move. These professionals need secure communications, instant access to data, fast response from their PCs, and advanced technologies to remove any obstructions that slow them down. For companies to stay agile, IT must support a growing fleet of consumer devices and new computing and management models, such as desktop virtualization and big data, while able to protect identities and networks and troubleshoot from afar. Business clients based on 4th generation Intel Core vpro processors include Intel vpro Technology. 1 These PCs integrate new embedded technologies for business users and hardware-based features that strengthen security and help IT personnel be proactive, effective, efficient, and responsive. Since the technologies are in the hardware, they are out of view and beyond the reach of today s PC threats and stealthy malware, which penetrate security perimeters through software and the operating system (OS). Table 1 lists the Intel technologies integrated into 4th generation Intel Core vpro processorbased platforms. These platform enhancements enable new levels of business user productivity and protect identities and enterprise data, while helping IT departments to remotely manage their fleet of business PCs; automate troubleshooting, repair, and maintenance tasks; and reduce deskside and on-site visits. Together, they help keep identities safe, protect company data, and enable IT departments to affect their bottom lines with lower total cost of ownership (TCO) and higher operational efficiency. 2

Table 1. 4th Generation Intel Core vpro Processor Family Embedded Technologies Business Productivity Benefit Category Business Productivity Enterprise-Class, Hardware- Assisted Security Embedded Intel Technology Intel Pro Wireless Display Intel vpro Technology with Location-Based Services Intel VMCS Shadowing 1,2 Intel Rapid Start Technology 3 Intel Smart Connect Technology 4 Enable multiple, innovative form factors Threat Mitigation Intel Trusted Execution Technology 5 Intel Platform Protection Technology with Boot Guard 6 Intel OS Guard 7 Intel Virtualization Technology 2 and McAfee Deep Defender* McAfee DeepSAFE Technology* Identity & Access Protection Intel Identity Protection Technology 8 with Public Key Infrastructure (PKI) or One-Time-Password (OTP) Intel Identity Protection Technology with Protected Transaction Display 8 No-Password VPN 6 Data & Asset Protection Intel Advanced Encryption Standard New Instructions 9 Intel Secure Key 10 Security Monitoring & Remediation McAfee epolicy Orchestrator*/Deep Command*/ Risk Advisor* Intel Platform Protection Technology with BIOS Guard 6 To keep ahead of the competition, enterprises need to enable professionals to stay productive and focused, and to help eliminate the tasks that deter them from their creativity and innovation. Several Intel technologies built into Intel vpro Technology-based business clients help achieve these goals. Make Meetings More Productive Mundane business meeting interruptions, such as passing the cable to a conference room projector to the next presenter, can break the flow of creative thinking and slow the speed of innovative change. The more time spent being productive in a meeting, sharing ideas and data, understanding new opportunities, and making better decisions, can help drive success. Intel Pro Wireless Display lets colleagues share screens without crossing wires. Intel Pro Wireless Display uses protected wireless, private networks to simplify secure connectivity with conference room projectors and wireless displays, enabling enhanced group collaboration and visualization. Collaboration, sharing, and creativity can keep progressing instead of stalling. While, secure, restricted, and private connectivity protects sensitive ideas and programs from leaks or unwanted sharing. Additional features help improve collaboration, allow IT to manage network bandwidth, restrict connectivity to the wireless display, and remotely manage the network, plus provide customization and notifications useful during meetings. Manageability & Automation Intel Professional Series SSDs Intel Setup & Configuration Software Enhanced KVM Remote Control 11 Intel vpro Powershell Module for Windows Powershell* Intel Active Management Technology 12 3

Locate Assets Quickly Time spent looking for a printer, lost notebook, or meeting room adds up to hours of lost business productivity and potential opportunities. Intel vpro Technology with Location-Based Services in business clients enable users and IT to quickly locate a missing device within the campus, find an unused meeting room for some immediate, secure collaboration, or send jobs to the nearest printer for fast retrieval. Enhance Virtual Environment Experiences As virtualization continues to evolve with more environments running together, new implementations, such as virtual machine control structure (VMCS) shadowing and nested virtualization help improve this vital technology. But, it becomes even more critical to ensure separation of these environments and that user experiences are not impacted by multiple VMMs running on the same system. Silicon-based Intel Virtual Machine Control Structure (Intel VMCS) Shadowing 1,2 helps deliver a more secure experience when multiple computing environments are simultaneously run together. Intel VMCS Shadowing provides advanced security and compute model flexibility, by enabling greater control and separation of operating environment partitions, such as IT-managed and user-owned areas. Get Back to Work Quickly Waiting for a business PC to get ready for work wastes valuable time. Intel Rapid Start Technology 3 gets users back to work quickly, while saving power, by allowing the device to go deep asleep but resume instantly. Ultrabook device users will be able to work longer on battery, while other PCs, like All-in-Ones (AIOs), 13 will help cut power usage across the enterprise. Make Smarter Decisions Faster Instant access to important information can help decision makers arrive at smarter resolutions more quickly. Intel Smart Connect Technology 4 keeps network- and Internet-sourced information accessible and up to date on the PC while busy professionals are on the move, so their data is ready when they are. Gain Productivity from More Devices 4th generation Intel Core vpro processors support more business platforms and innovative form factors, including all-in-one PCs (AOIs), Ultrabook devices, notebooks, desktops, ultra-small platforms, and enterprise-class tablets, enabling a wide range of business clients that help keep users productive wherever they go. As enterprises continue to embrace consumerization and IT departments manage a wider variety of devices, Intel technologies help companies stay agile and competitive without sacrificing critical IT policies. Embedded, Hardware- Assisted Security Today s threats attempt to take advantage of every interaction users have with company data and systems. As a result, companies are facing more targeted attacks that do more damage than yesterday s viruses. And attacks are using stealth techniques to make it harder to detect, prevent, and remove threats. Business PCs based on 4th generation Intel Core vpro processors offer unprecedented security with embedded technologies 6 enabled in silicon, rather than software. These built-in, hardware-based technologies, operating below the OS, installed agents, and applications, allow greater threat mitigation, tighter identity and access protection, better data security, and effective security monitoring and remediation. Built-in functionality even allows the business client to monitor and protect itself. Threat Mitigation Embedded, hardware-assisted security technologies help mitigate threats from today s sophisticated attacks on business PCs. Keep Virtual Environments Secure Intel Virtualization Technology 2 goes beyond enhancing virtual environments. This embedded technology provides the foundation for protection of virtual machines using Intel Trusted Execution Technology 5 (Intel TXT) and McAfee DeepSAFE Technology*. Intel TXT protects virtual machines against stealthy malware attacks by verifying a known safe environment for the VM as it launches. Intel Virtualization Technology and McAfee DeepSAFE Technology enhance and secure certain tasks in virtualized environments that further protect the PC. 4

Boot Securely on Windows 8* With the launch of Windows 8*, new security features in the OS help protect the platform and users. Intel Platform Protection Technology with Boot Guard 6 supports Windows 8 secure boot and helps protect against boot block level malware execution by saving critical platform characteristics outside the OS in hardware, which later provide a known good baseline for Windows bootup and attestation. Prevent Privilege Escalation Attacks Some sophisticated malware has been known to take advantage of OS conditions that allow code to escalate execution in restricted system areas, below the OS and security agents. Intel OS Guard 7 keeps malware from rooting below the OS by helping ensure against escalation of privilege attacks. Enable Protection Beyond the OS Malware often uses root-kits and other devices to thwart system-level antimalware software and security agents. These threats then propagate their code or attack specific areas by remaining hidden below the OS. McAfee DeepSAFE Technology co-developed with Intel detects, blocks, and remediates advanced, hidden attacks from bootup through user operation. Identity and Access Protection Intel security technology hardware helps keep identities and sensitive data safe. Keep Identities Safe Today s sophisticated identity threats attack software-based identity protection, such as passwords, certificate keys, and software tokens, through the OS. Intel Identity Protection Technology 8 (Intel IPT) uses hardware-assistance that is out of sight and reach of malware and the OS to help secure critical data and operations, such as key generation and user data entry, while supporting familiar applications, like VPN clients. Intel IPT offers the security of hardware with the convenience and response of software. Several Intel IPT implementations support different types of secure uses: Intel IPT with One Time Password (Intel IPT with OTP) enables hardware-protected secure one-time password tokens. Intel IPT with Protected Transaction Display (Intel IPT with PTD) uses hardware-based authentication to protect against screen scrapers and key loggers, and it improves security by verifying user presence with secure input. Intel IPT with Public Key Infrastructure support (Intel IPT with PKI) relies on hardware-assistance to create and process private keys, plus it encrypts certificate data with a Platform Binding Key, which binds the certificate to the platform. Intel IPT helps protect user identities, keep logins safe, and ensure against automated entries by robots and other non-human agents. Simplify No-Compromise, Secure Access to Enterprise Data Intel IPT with PKI can eliminate the need for dedicated VPN client passwords, keeping end-users productive and reducing Help Desk password resets requests, while providing enterprise-class security. No-Password VPN 6 is an effective and secure use case for two-factor authentication based on a login password to the device and PKI certificates authenticated with Intel IPT with PKI. No-Password VPN simplifies the user experience, while maintaining strong two-factor authentication for corporate networks. Data Protection The objective of enterprise security is to protect sensitive data wherever it resides, whether in transit or at rest. Intel embedded technologies deliver solid data protection without slowing user productivity. Enable Encryption Everywhere Data is better protected when it is encrypted. But, traditionally, real-time encryption came at a high performance cost and productivity tax for the user. With Intel Advanced Encryption Standard New Instructions 9 built into the processor, encryption and decryption runs very fast, eliminating the performance penalty to users and enabling ubiquitous encryption across business clients based on 4th generation Intel Core vpro processors. Encrypt with Confidence When random numbers are needed for encryption, the results can be safer with high-quality random numbers generated out of sight and out of reach of malware. Intel Secure Key 6,10 generates random numbers in discrete silicon using true random number instructions. During generation, nothing is exposed, keeping the process out of reach of any malware that might affect number-generation instructions. 5

Security Monitoring and Remediation For fast response to detected threats, business clients based on 4th generation Intel Core vpro processors enable automatic monitoring and remediation using McAfee enterprise security applications. IT can take advantage of built-in capabilities and McAfee software to rapidly detect and address a threat remotely. 4th generation Intel Core vpro processor-based platforms combined with McAfee epolicy Orchestrator*, McAfee Deep Command*, and McAfee Risk Advisor* enable IT to reduce the cost of operations and allow comprehensive management of enterprise networks and endpoint security. Intel Platform Protection Technology with BIOS Guard protects business clients against BIOS corruption from sophisticated malware by preventing changes without proper signing and authorization. Manageability and Automation With PCs based on 4th generation Intel Core vpro processors, IT can connect to management functions outside the PC s OS over the corporate wired or wireless network, and, in most cases, even if the PC is outside the firewall or turned off. 1,12 These business clients can even self-initiate communication with the IT console for management and maintenance purposes, when a threat is detected, or under other conditions specified by IT management. Thus, manageability features are always available, allowing IT to work fast and efficiently. Built-in automation and management capabilities include: Remote configuration, maintenance, and recovery of Intel Professional Series SSDs. Fast, remote setup and configuration of new business clients with Intel Setup and Configuration Software (Intel SCS). Keyboard, video, and mouse (KVM) control of remote PCs with Enhanced KVM Remote Control. Custom automation scripting support with Intel vpro Powershell Module for Microsoft Windows Powershell*. Remote diagnosis, isolation of problems, and repair using Intel Active Management Technology (Intel AMT). With these capabilities, in addition to positive impacts on IT efficiencies and TCO, PCs stay healthier and businesses can minimize user downtime, while improving both employee and IT productivity. SSD Storage Performance and Manageability Besides being incredibly fast and reliable enterprise-class storage devices, Intel Professional Series SSDs provide full-time disk encryption, so data is always protected at rest. IT can easily configure new drives remotely with Intel Setup and Configuration Software, and personnel can unlock them using Intel Remote Encryption Management to access important drive data through Intel vpro Technology built into the platform. Users get enhanced productivity from SSD performance, enterprises benefit from fully encrypted data, and IT remains efficient managing the devices from afar. Simplify and Speed Up Activation Once the PCs are deployed, activating any management and security services not already running can be done in minutes. The latest version of Intel Setup and Configuration Software allows IT personnel to quickly configure the services, so the business and user get full, immediate benefits of embedded security, remote management, and performance. You can find more information about configuration on the Intel web site at www.intel.com/go/scs. The embedded technologies in business clients using 4th generation Intel Core vpro processors deliver a system-wide solution that extends across the entire IT infrastructure to enable security, manageability, and power savings. Configuration and deployment of the solution is beyond the scope of this paper. For more information on implementing management and security services, see the Intel web site at www.intel. com/go/vpro. Get Behind the Keyboard with Enhanced KVM Remote Control In spite of improved management tools, some problem tickets still require that users help resolve the problem. Even with built-in remote management capabilities, the complexity of these corner case or edge failures have traditionally meant that a technician must still make desk side visits or ask users to help resolve the problem. Hardware-based Enhanced KVM Remote Control can help reduce problem resolution time for complex software issues by allowing a technician to get behind the user s keyboard without leaving the help desk. Unlike software-based Windows remote desktop, hardware-based Enhanced KVM Remote Control allows the technician to see and control the PC through all states. This helps technicians resolve software failures for both wired and wireless PCs, even for PCs outside the corporate firewall. 6

Enhanced KVM Remote Control in PCs based on 4th generation Intel Core vpro processors is available in 27 languages and supports up to three monitors (up to 2560 x 1600 with 16-bit color) in portrait and landscape modes. Customize Automation Sometimes IT needs to customize automation beyond the standard functions of management consoles. Using Windows Powershell* and the Intel vpro Powershell Module for Intel vpro Technologybased platforms, IT personnel can directly access management features to create unique functionality they require to be more efficient and effective. Resolve Problems Remotely Deskside and service-center calls can take up a large portion of an IT budget. Intel vpro Technology enables IT personnel to easily configure, diagnose, isolate, and repair PCs remotely, even if systems are unresponsive. Using Intel Active Management Technology features, such as remote/redirected boot, 4th generation Intel Core vpro processors can help IT managers reduce deskside visits and achieve the following: Get users back to work fast with remote configuration, diagnosis, isolation, and repair of PCs, even if systems are unresponsive and outside the corporate firewall. Reduce energy usage by automatically shutting down PCs during off-hours. Automatically power up PCs to get them ready for arriving workers. Easily re-direct, reboot, and re-image PCs from anywhere. Reduce costs by automatically inventorying hardware and software. Ready for Windows 8* 4th generation Intel Core vpro processors deliver performance to enable a powerful enterprise running on current and next-generation productivity platforms, including Office* 2010/2013, IE9*, and other Windows 8 applications. Now, companies can meet all their consumerization needs, from enterprise-class tablets to powerful laptops and desktops, with hardware-enhanced technologies all built on Windows 8 and 4th generation Intel Core vpro processors. The Ultimate in Enterprise Security and Productivity for Business The 4th generation Intel Core vpro processor family delivers top-of-the line benefits for business productivity, hardware-assisted security, and remote and automated manageability. This processor family enables unprecedented identity and data protection, always available access to the PC both inside and outside the corporate firewall, improved remote access, and remote control to resolve even the most complex issues without leaving the help desk. Many case studies have shown how PCs with Intel Core vpro processors can help substantially reduce IT service costs for problem resolution and software updates (refer to the Intel web site, www.intel.com/references/ecm/index.htm, for case studies in various industries). The 4th generation Intel Core vpro processor family is the ideal foundation for business clients that need to meet the demands of an agile business. Find out more about business clients with 4th generation Intel Core vpro processors online at www.intel.com/go/vpro. Keep systems compliant by automatically waking up clients and updating software and agents, even after normal business hours and when the PC is turned off. Automatically upgrade applications or OS. 7

1 Intel vpro Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: http://www.intel.com/technology/vpro/. 2 Intel Virtualization Technology requires a computer system with an enabled Intel processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/go/virtualization. 3 Intel Rapid Start Technology requires a select Intel processor, Intel software and BIOS update, and Intel Solid-State Drive (Intel SSD). Depending on system configuration, your results may vary. Contact your system manufacturer for more information. 4 Requires a 3rd or 4th generation Intel Core processor, Intel software and OEM-enabled BIOS, Intel Wireless adaptor, and Internet connectivity. Solid-state drive (SSD) or equivalent may be required. Depending on system configuration, your results may vary. Contact your system manufacturer for more information. 5 No computer system can provide absolute security under all conditions. Intel Trusted Execution Technology (Intel TXT) requires a computer with Intel Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, see http://www.intel.com/technology/security. 6 No computer system can provide absolute security under all conditions. Built-in security features available on select Intel Core processors and may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details. 7 No system can provide absolute security. Requires an Intel OS Guard enabled system with a 3rd gen Intel Core vpro processor and an enabled operating system. Consult your system manufacturer for more information. 8 No system can provide absolute security under all conditions. Requires an Intel Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel Core processor, enabled chipset, firmware, and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com. 9 Intel Advanced Encryption Standard New Instructions (AES-NI) requires a computer system with an AES-NI-enabled processors, as well as non-intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel Core processors. For availability, consult your system manufacturer. For more information, visit http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni 10 No system can provide absolute security. Requires an Intel Secure Key enabled PC with a 3rd gen Intel Core vpro processor and software optimized to support Intel Secure Key. Consult your system manufacturer for more information. 11 KVM Remote Control (Keyboard Video Mouse) is only available with Intel Core i5 vpro processors and Core i7 vpro processors with active processor graphics. Discrete graphics are not supported. 12 Security features enabled by Intel Active Management Technology (AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/technology/manage/iamt. 13 Intel Rapid Start Technology transitions a system that is in Sleep or Standby, an S3 power state that keeps memory and other components powered, to a hardware power state that does not do so, an S4 power state. Refer to manufacturer s specifications for system specific information. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGE- MENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or by visiting Intel s Web site at www.intel.com. Copyright 2013 Intel Corporation. All rights reserved. Intel, the Intel logo, Core, vpro, Intel Inside, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Printed in USA 0513/ACH/HBD/PDF Please Recycle 324823-004US