White Paper: The All New 2010 Intel® Core™ vPro™ Processor Family: Intelligence that Adapts to Your Needs
•Recovery token, which is generated by IT or the user’s service provider via the theft management console (upon request by the end user). The
Both methods return the PC to full functionality, and both offer a simple, inexpensive way to recover the laptop without compromising sensitive data or the system’s security features.
Intel AT must be enabled (on) in order for IT to take advantage of these intelligent security features.
Industry support and software development
Intel AT integrates with existing
In order to deploy an Intel AT solution, a service provider or ISV with Intel AT capabilities is required. A new 2010 Intel Core vPro processor includes an SDK and documentation for ISVs and service providers to help test and validate their designs for
One of the performance burdens of higher security is the encryption and decryption of the hard drive upon every access. This has become a bottleneck to performance, and many IT departments have not used encryption protection because of the performance
One of the encryption standards adopted by the U.S. Government is AES (Advanced Encryption Standard)24. A new Intel Core vPro processor now includes new
•Recent benchmarks compared a new 2010 Intel Core i5 processor- based PC to an
A new 2010 Intel Core i5 vPro processor with
There are several methods in use today to wake a PC in order to push out an update, but those methods are not usually secure or reliable, or they work only when the OS is running properly. In contrast, a new Intel Core vPro processor includes a secure, encrypted
With Intel vPro technology, technicians can:
•Remotely power up laptop and desktop PCs from the IT console, so updates can be pushed even to machines that were powered off at the start of the maintenance cycle.
•Deploy more updates and critical patches
•Check a PC’s software version information, .DAT file information, and other data stored in nonvolatile memory, and find out if anything needs updating without having to wake or power up a PC.
•Help lower power consumption for businesses, by powering PCs off when not in use, and remotely and securely powering them up off- hours only for the update or patch (or other service).
These capabilities allow IT administrators to automate more security processes. In turn, this can help IT administrators establish a more secure, better managed environment.
Greater automation for compliance with corporate policies
With the ability to remotely access PCs regardless of power state
or OS state, IT administrators can automate more processes, including update, remediation, and management processes. For example, if a polling agent discovers software that is out of date, the
13