Security Claim: Intel® Trusted Execution Technology
No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/go/inteltxt.
Intel® Turbo Boost Technology
Requires a system with Intel® Turbo Boost Technology capability. Intel Turbo Boost Technology 2.0 is the next generation of Turbo Boost Technology and is only available on select Intel® processors. Consult your PC manufacturer. Performance varies depending on hardware, software, and system configuration. For more information, visit http://www.intel.com/go/turbo.
Intel® vPro™ Technology
Intel® vPro™ Technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more about the breadth of security features, visit http://www.intel.com/technology/vpro.
Intel® Hyper-Threading Technology
Requires an Intel® Hyper-Threading Technology-enabled system, consult with your PC manufacturer. Performance will vary depending on the specific hardware and software used. Not available on all Intel® processors. For more information, including details on which processors support Intel HT Technology, visit http://www.intel.com/go/ht.
Security Claim: Built-in Security
No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details. For more information visit www.intel.com/technology/security.
Security Claim: Intel® Virtualization Technology
Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assistvirtualization-technology.html.
Security Claim: Intel® Identity Protection Technology
No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel® Core™ processor, enabled chipset, firmware, and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/identityprotection/identity-protection-technology-general.html.
Security Claim: Intel® Advanced Encryption Standard–New Instructions
Intel® Advanced Encryption Standard–New Instructions (Intel® AES-NI) requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://www.intel.com/content/www/us/en/architecture-and-technology/advanced-encryption-standard--aes-/data-protection-aes-generaltechnology.html.
Intel® Rapid Start Technology
Requires a select Intel® processor, Intel® software and BIOS update, and Intel® Solid-State Drive (SSD). Depending on system configuration, your results may vary. Contact your system manufacturer for more information.
Intel® Wireless Display
Requires an Intel® Wireless Display enabled PC, compatible adapter and TV. 1080p and Blu-ray* or other protected content playback only available on 2nd or 3rd gen Intel® Core™ processor-based PCs with built-in visuals enabled, a compatible adapter and media player, and
Claim: Built-in visuals
Built-in visual features are not enabled on all PCs and optimized software may be required. Check with your system manufacturer. Learn more at http://www.intel.com/go/biv.
As compared with other PC I/O connection technologies including eSATA, USB, and IEEE 1394 Firewire*. Performance will vary depending on the specific hardware and software used. For more information go to http://www.intel.com/technology/io/thunderbolt.
Intel® Smart Connect Technology
Requires a select Intel® processor, Intel® software and BIOS update, Intel® wireless adapter, and Internet connectivity. Solid state memory or drive equivalent may be required. Depending on system configuration, your results may vary. Contact your system manufacturer for more information.
Intel® My WiFi Technology
Intel® My WiFi Technology is an optional feature and requires additional software and an Intel® Centrino® wireless adapter. WiFi devices must be certified by the WiFi Alliance for 802.11b/g/a in order to connect. See http://www.intel.com/content/www/us/en/wireless-products/wireless-solutions.html for more details.
Claim: Quick Sync Video—3-year baseline
Video transcode claim using CyberLink* MediaEspresso 6 to render a 4-minute, 449 MB, 1920 x 1080i, 18884 Kbps, MPG2 video file for playback on an Apple* iPod* with resolution of 640 x 360, H.264, and file format of .MP4. Speedup is 4X faster on 3rd gen Intel® Core™ i5-3450 processor (desktop) and 3rd gen Intel® Core™ i5-3320M processor (laptop) compared with Intel® Core™ processor (desktop) and Intel® Core™2 Duo E8400 (desktop) and P8600 (laptop).
Security Claim: Intel® OS Guard
No system can provide absolute security. Requires an Intel® OS Guard-enabled system with a 3rd gen Intel® Core™ vPro™ processor and an enabled operating system. Consult your system manufacturer for more information.
Security Claim: Anti-Theft
No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware, and software with data encryption, and service activation with a capable service provider. Consult your system manufacturer and service provider for availability and functionality. Service may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft
Security Claim: Intel® AMT
Security features enabled by Intel® AMT require an enabled chipset, network hardware and software, and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, see http://www.intel.com/technology/platform-technology/intel-amt/.
KVM Remote Control
KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported.
Security Claim: Intel® Secure Key
No system can provide absolute security. Requires an Intel® Secure Key enabled PC with a 3rd gen Intel® Core™ vPro™ processor and software optimized to support Intel Secure Key. Consult your system manufacturer for more information.
Fact: 174M records were compromised
In 2011, over 174M records were compromised due to security breaches. (Source: http://www.pcworld.com/article/252349/hackers_breached_174_million_records_in_2011.html )
Fact: over 750 organizations were victimized
In 2011, over 750 organizations were victimized by a massive cyber-attack on the world’s largest two-factor authentication vendor. It took months to revoke and re-provision tokens for affected users. (Source: http://krebsonsecurity.com/2011/10/who-else-was-hit-by-the-rsa-attackers/ )
Fact: over 75 million malware samples
There are over 75 million unique malware samples in existence. (Source: http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2011.pdf)
Fact: more than 200,000 newly discovered malware binaries
In the first dozen weeks of 2012 alone, more than 200,000 newly discovered malware binaries were identified.* (Source: http://blogs.mcafee.com/mcafee-labs/signed-malware-you-can-runbut-you-cant-hide)
Fact: Over 12,000 laptops are lost or stolen each week
Over 12,000 laptops are lost or stolen each week from U.S. airports. The average cost of a lost or stolen laptop is $49,246. (Source: http://www.ponemon.org/news-2/8)
Fact: Annual cost of cybercrime globally is $114 Billion
The annual cost of cybercrime globally is estimated at $114,000,000,000. (Source: http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02)
Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
Claim: Cross Client
Cross-client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurations and performance test as follows: (Mobile) Comparing pre-production 3rd generation Intel® Core™ i5-3320M Processor (4T2C, 3M cache, up to 3.20 GHz), Intel Reference Board, pre-production BIOS, Memory 8 GB (2x4 GB) Micron* PC3-12800, Hitachi* Travelstar 320 GB hard-disk drive, Intel® HD Graphics 4000, Driver pre-production 22.214.171.12416 , Chipset INF pre-production 126.96.36.1999. Intel® Core™2 Duo Processor P8600 (2T2C, 3M cache, 2.40 GHz, 1066 MHz FSB), HP* dv6, BIOS HP* vF.31, Memory 4 GB (2x2 GB) Micron* PC3-8500, Hitachi* 320 GB hard-disk drive, Mobile Intel® GM45 Chipset Family w/ integrated graphics Driver: 188.8.131.529, Chipset INF 184.108.40.2060, Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601 (Desktop) Comparing pre-production 3rd generation Intel® Core™ i5-3450 Processor (4T4C, 6 MB cache, 3.1GHz base up to 3.5GHz), Intel® Desktop Board DH77KC, Memory 8 GB (2x4 GB) Micron* DDR3-1600, Seagate* 1 TB, Intel® HD Graphics 2500, Driver: 220.127.116.1116 (BIOS:vSLZ7510H.8 6A.0033.2011.1230.1146, Chipset INF 18.104.22.1689, Intel® Core™ 2 Duo E8400 (2C2T, 3.0GHz, 6MB cache), Memory 4 GB (2x2 GB) Micron* DDR2 800 MHz, Seagate* 1TB hard-disk drive, Intel® G45, Driver: 22.214.171.1249, (BIOS:IDG4510H.86A.0135.2011.0225.1100, INF), Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601
Business productivity claims based on SYSmark* 2012, which is the mainstream office productivity, data/financial analysis, system management, media creation, 3D modeling, and web development benchmark tool used to characterize the performance of the business client. SYSmark 2012 features user-driven workloads and usage models developed by application experts. Multitasking claims based on PCMark* 7, a hardware performance benchmark for PCs running Microsoft Windows* 7, includes a collection of various single- and multi-threaded CPU, graphics, and HDD test sets with a focus on Windows* application tests. Encryption workload consists of SiSoftware Sandra* 2011—AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm. For more information go to http://www.intel.com/performance.
Claim: vPro Benefits
Source: Intel. Results shown are from 2010/2011 Intel MSP Case Studies: Axcell Technologies, Speros, Circle Computer Resources, IT Guru, MidAmerica Computer Corporation, Green Light Business Technology, Do IT Smarter, Sabio Information Technologies, STF Consulting, Alvarez Technology Group, outsourceIT, Nex-Tech, Alpheon, Base 2, Dempsey Bluevar. http://msp.intel.com. Actual results may vary.