White Paper: The All New 2010 Intel® Core™ vPro™ Processor Family: Intelligence that Adapts to Your Needs
Table of Contents
Executive Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 3 |
4 | |
The way we do business has changed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 4 |
New and proven technologies pair up to deliver intelligent performance, |
|
manageability, and security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 4 |
PCs can now be managed as strategic assets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | . 5 |
Spend wisely and recoup costs rapidly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | . 5 |
New in the all new 2010 Intel Core vPro processor family. . . . . . . . . . . . . . . . . . . . . . . . . | . 5 |
Key features of the all new 2010 Intel Core vPro processor family. . . . . . . . . . . . . . . . . . . . . . | . 6 |
What, exactly, is Intel® vPro™ technology? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | 7 |
Intelligent features to solve key challenges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | . 7 |
Manage PCs regardless of power state. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | . 8 |
Use an existing management console for both laptop and desktop PCs. . . . . . . . . . . . . . . . . . . | 9 |
Remote communication – virtually anytime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | . 9 |
Communication outside the corporate firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Communicate remotely with wired or wireless PCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Robust security schemes for remote communication . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Better protection through smarter security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Intel®
Push updates down the wire — regardless of PC power state. . . . . . . . . . . . . . | . . . . . . . . . 13 | |
Filter threats and isolate PCs automatically based on IT policy. . . . . . . . . . . . . . . . . . . . . . . . . . . | . . . . . . . . . . | . . . . . . . . 14 |
Automated, continual checking for agents. . . . . . . . . . . . . . . . . . . . . . . . | . . . . . | . . . . 14 |
Receive alerts even if a system is off the corporate network. . . . . . . . . . . . . . . | . . . . . | . . . . 15 |
. . . . . | . . . . 15 | |
Intel® Trusted Execution Technology (Intel® TXT) . . . . . . . . . . . . . . . . . . . . | . . . . . | . . . . 15 |
Faster, easier remote manageability helps reduce costs. . . . . . . . . . . . . . . . . . | . . . . . | . . . . 15 |
Remote upgrades save IT and user time. . . . . . . . . . . . . . . . . . . . . . . . . | . . . . . | . . . . 15 |
Resolve more problems remotely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Accurate, remote discovery and inventory for wired or wireless systems. . . . . . . . | . . . . . | . . . . . 17 |
KVM Remote Control lowers support costs. . . . . . . . . . . . . . . . . . . . . . . | . . . . . | . . . . 17 |
PC Alarm Alock – local wake from any sleep state. . . . . . . . . . . . . . . . . . . . | . . . . . | . . . . 18 |
Power down at night and save on power bills. . . . . . . . . . . . . . . . . . . . . . | . . . . . | . . . . 18 |
Virtualization enables flexible computing models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Usage models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Virtualization: Virtual containers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Virtualization: Multiple OSs (traditional model). . . . . . . . . . . . . . . . . . . . . . . . . . . | . . . . 20 | |||
Intel® Virtualization Technology (Intel® VT) features. . . . . . . . . . . . . . . . . . . . . . . . | . . . . 21 | |||
Intel® VT is compatible with other technologies. . . . . . . . . . . . . . . . . . . . . . . . . . | . . . . 21 | |||
Key benefits of virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . | . | . | . | . 21 |
Go mobile – cut costs and improve productivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . | . | . | . | . 22 |
Wireless mobility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Responsive,
Energy Star compliance and energy efficient. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Intel® Turbo Boost Technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Intel®
Simplify and speed up activation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
General provisioning process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Methods to establish security credentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Activation models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Ready for the future. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Stable,
Wired or wireless: The intelligence of security and manageability on every chip. . . . . . . . . . . . . . . . 26
2