The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Intel® vPro™ Platform Secures and Manages Remote ClientsSecuring and Managing Remote ClientsIntel® vPro™ platform enhances remote management, user productivity, and client security for Meredith CorporationCompanyMeredith Corporation is the leading media and marketing company with brands such as Better Homes and Gardens, Family Circle, and Parents. In the turbulent world of print and digital media, Meredith thrives by moving rapidly into new distribution platforms and custom marketing solutions.ChallengeAs a dynamic and growing company, Meredith has a geographically distributed workforce with a rising number of offices for its IT organization to support. In addition to meeting users’ performance requirements, Meredith IT needs ways to quickly add PCs to the network and minimize downtime if problems occur. Protecting confidential data is also crucial to meeting regulatory requirements.SolutionWorking with the Intel Online Sales Center, Meredith is standardizing on Dell PCs, laptops, and business-class Ultrabook™ devices powered by Intel® Core™ i5 vPro™ processors for users in remote offices. Intel Core i5 vPro processors provide advanced security and remote management capabilities while giving users outstanding performance for content creation, spreadsheet calculations, and more.Read the full Intel® vPro™ Platform Secures and Manages Remote Clients Solution Brief.
Intel® AMT setup is fast and easy with remote configuring and patching for time and cost savings.
Intel’s Dan Brunton introduces the training, covering legal notices and disclaimers and the agenda.
Module 1: Introduction to Intel® vPro™ Technology
Covering Intel® AMT Configuration Utility, remote configuration services, and discovery of Intel® SCS.
A demo of the newest release of Intel® Setup and Configuration Software (8.1)
See how built-in technologies offer protection in threat mitigation, identity, data, and monitoring.