business client procurement for the public sector€¦ · business client procurement guide for the...

20
Executive Summary CIOs and IT managers in public sector organizations face daunting challenges. A tur- bulent worldwide economic climate has contributed to increasing pressure on govern- ment IT budgets and a changing business environment that requires greater flexibility and tighter security. IT agility is more important than ever, with a growing number of enterprise client devices to manage within a constantly evolving security landscape. Add to that the effect of IT consumerization, plus the high expectations of employees for client performance, mobility, and fast IT response times that match or exceed the technology experiences they expect in their personal lives. The ever-increasing pace of technology innovation makes it essential for organizations to make a comprehensive assessment of their client device computing requirements and the many factors that can influence their procurement decisions. This will help to ensure the devices they procure now are flexible enough to meet the organization’s re- quirements throughout the multi-year planned lifecycle. This guide can help IT buyers in public sector organizations make informed choices when: Evaluating client device platform computing performance, security, and man- agement characteristics Determining the importance of various technology and capability criteria Considering factors that contribute to total cost of ownership (TCO) Drafting technical specifications in the tender documentation for public contracts It also provides links to other sources of information to help with the many impor- tant considerations in any client device procurement decision. sumer innovation and provide the ca- pabilities for the best productivity. IT must balance these demands with fac- tors like security, manageability, TCO, and compliance. Figure 1 shows how business users' IT ex- pectations and requirements are evolving. Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs Evolving Business Needs Business users are also consumers who demand a lot from their computing de- vices. They expect their devices to en- able the kinds of experiences they want to have. They want innovative, sleek devices that keep pace with con- White Paper Mobile Computing Government/Public Sector

Upload: others

Post on 19-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Executive Summary

CIOs and IT managers in public sector organizations face daunting challenges. A tur-bulent worldwide economic climate has contributed to increasing pressure on govern-ment IT budgets and a changing business environment that requires greater flexibilityand tighter security. IT agility is more important than ever, with a growing number ofenterprise client devices to manage within a constantly evolving security landscape.Add to that the effect of IT consumerization, plus the high expectations of employeesfor client performance, mobility, and fast IT response times that match or exceed thetechnology experiences they expect in their personal lives.

The ever-increasing pace of technology innovation makes it essential for organizationsto make a comprehensive assessment of their client device computing requirementsand the many factors that can influence their procurement decisions. This will help toensure the devices they procure now are flexible enough to meet the organization’s re-quirements throughout the multi-year planned lifecycle. This guide can help IT buyersin public sector organizations make informed choices when:

• Evaluating client device platform computing performance, security, and man-agement characteristics

• Determining the importance of various technology and capability criteria

• Considering factors that contribute to total cost of ownership (TCO)

• Drafting technical specifications in the tender documentation for public contracts

It also provides links to other sources of information to help with the many impor-tant considerations in any client device procurement decision.

sumer innovation and provide the ca-pabilities for the best productivity. ITmust balance these demands with fac-tors like security, manageability, TCO,and compliance.

Figure 1 shows how business users' IT ex-pectations and requirements are evolving.

Business Client ProcurementGuide for the Public SectorHow to Select the Right Client Computing Platform for your Needs

Evolving Business Needs

Business users are also consumers whodemand a lot from their computing de-vices. They expect their devices to en-able the kinds of experiences theywant to have. They want innovative,sleek devices that keep pace with con-

White PaperMobile ComputingGovernment/Public Sector

Page 2: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Experience

• Access Data fromAny Device

•• Responsiveness

• Easy Collaboration

• Productive on AnyDevice, Anywhereand Any Time

• Business/Personalon Same Device

• High Performance

• Familiar and Easyto Use

IT Requirements

• Low TCO

•• Compliance

• Easy Integration

• Compatibility

• Data Security

• Device Security andManageability

Device

• Thin and Light

•• Long Battery Life

• Innovative andDurable Design

• Clutter Free

• Touch Enabled

• Instant On

• Always Connectedand Up to Date

• Multi-MonitorSupport

Key Considerations for Requests forProposals (RFPs)

User Requirements

The procurement of business clientcomputing platforms needs to take intoaccount usage patterns within the or-ganization, as well as the different typesof users and their computing require-ments. What do they need from theirsystems to successfully achieve the or-ganization’s goals? Do they have theright tools to do the job—both todayand over the next few years?

New Capabilities

With processor capabilities improving atan exponential rate, IT buyers need to beaware of the latest computing featuresthat could make a valuable difference totheir organizations. For example, built-inmanageability (a feature available withthe Intel® vPro™ platform) may meanfewer interruptions for employees andincreased efficiency for IT. Notebooksand tablets, which can use significantlyless energy than desktops, can also en-able users to be more productive whilereducing energy costs. And increased se-curity means critical data can be betterprotected from viruses and malware orthe assets themselves from loss or theft.

TCO

CIOs and IT managers must carefullyconsider TCO when making IT procure-ment decisions. This requires a mindsetshift from simply considering the initialacquisition costs to taking into accountall direct and indirect costs associatedwith both the acquisition and continuedmaintenance and support of computingplatforms. This includes considering theexpected business client device lifecycleto ensure the systems will have enoughheadroom for the future.

Intel’s Best Value for Money Procurement Model

Intel’s Best Value for Money procurementmodel is based on best practices used byIntel IT and highlights important planningelements that form part of Intel’s busi-ness client procurement process—includ-ing strategic planning (Figure 2), businessanalysis, and sourcing.

This model only provides high-levelguidance. Each IT organization hasunique needs and constraints which itmust factor into its own best-value pro-curement model.

Figure 3 shows the business client pro-curement lifecycle.

Contents

Executive Summary . . . . . . . . . . . . . . . .1

Evolving Business Needs . . . . . . . . . . .1

Key Considerations for Requests for Proposals (RFPs) . . . . . . . . . . . . . . . . . . .2

Intel’s Best Value for Money Procurement Model . . . . . . . . . . . . . . . .2

Planning Ahead for the Optimal Configuration . . . . . . . . . . . . . . . . . . . . . .7

Bring Your Own Device . . . . . . . . . . . . .7

Creating Flexible Environments forIT Service Delivery . . . . . . . . . . . . . . . . .7

Security . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Form Factors . . . . . . . . . . . . . . . . . . . . .10

Platform Features and Benefits . . . .13

Good/Better/Best Comparison . . . .19

Conclusion . . . . . . . . . . . . . . . . . . . . . . .19

Learn More . . . . . . . . . . . . . . . . . . . . . . .19

Figure 1. Business users’expectations and requirementsfor their computing devicesare evolving.

2

Business Client Procurement Guide for the Public Sector

Page 3: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Figure 3. Business client procurement lifecycle

Figure 2. Strategic planningconsiderations

3

Business Client Procurement Guide for the Public Sector

Organization Strategy andProcesses

• Organization Strategic Plan

•• Planning Life Cycle

• Forecasted Growth

• Budget Life Cycle

• RFP Time Span

• Application andTechnology

• Roadmaps

• Project Interdependencies

Assess Trends

• Compute Models

•• Security Threats

• Mobile Workforce

• Telework Trends

• Management Software

• Software Load

Organization andRegulatory Requirements

• Local RegulatoryEnvironment

•• Energy Efficiency

• Documentation Security

• Ergonomics

• Client Management (AssetImage, Deployment)

• Mobile/Wireless

Fleet Guidelines

• Organization Priorities

•• Standards Strategy

• Desired Life

• Security Level

• Manageability

• TCO Model

• Mobility

Optimal PC Refresh• Timing and TCO• Line-of-Business Needs

Deployment of New Technology• One-Touch, Proactive

Approach• Continuous Innovation

Inventory Management• Centralized• Standardized

Decommissioning and Retirement• Replace Outdated

Equipment• Reuse or Recycle when

PossibleService Desk Support• Consolidated and

Automized• Remote Client

ManagementBuild and Image Management• Standard Configuration• Single Build Process

Treat PCs asStrategic Assets

Simplify the ClientLandscape

Intel IT’s PC Lifecycle Management Spans the Time from Deployment of New Technology and PC Refresh to PC End of Life. (Source: “PC Lifecycle Management: Boosting Productivity and IT Efficiency,”July 2012.)

Page 4: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

4

Business Client Procurement Guide for the Public Sector

Organization Strategy and Processes

Critical to any strategic planning effort isan understanding of the organization’sstrategy and processes for IT procure-ment. These typically include elementssuch as:

• Strategic objectives

• Budget lifecycle

• Procurement processes

• Project interdependencies

Due to the interdependencies of most ITprojects and technology deployments,early alignment and coordination ofbusiness client device procurements iscrucial to meeting high-level strategicobjectives. Budgets are coordinated torealize the maximum value of businessclient and IT investments.

Figure 4 shows business analysis consid-erations for choosing the right platform.

Fleet Guidelines

An IT organization’s priorities are impor-tant in selecting business client devices.For instance, the organization may belooking to support expansion, a particulartechnology rollout, or another key ITstrategic objective. It may have a stan-dardization strategy to ensure commoncomponents across all notebooks, or cen-tralized product selection for all depart-ments. It is also important to know howlong a business client device will be usedbefore replacement, as well as what spe-cific security and management featuresare required. Another key element ismatching the right business client deviceto the intended use—for instance,whether the user requires mobility, ex-tended battery life, or an ultra-thin andlight design. Finally, using a comprehen-

sive methodology based on TCO will helpan organization to understand the truecost of deploying and maintaining itsbusiness client fleet.

Assess Trends

To make configuration decisions that avoidexpensive mid-cycle upgrades, it’s impor-tant to properly assess industry trends andconsider the organization’s future needs.This includes, for instance, taking into ac-count the potential impact of:

• Upcoming operating system or pro-ductivity software releases

• Improved management solutionsthat can lower TCO

• Evolving security threats and theneed to support capabilities such asteleworking, collaboration tools, andIT consumerization

• New compute models and form factors

Figure 4. Business analysis

User Profiles

• Mobile Worker

•• Task Worker

• Administrative

• Executive

• Engineer

• Shared PC/Kiosk

SW Spec (Based onUser Profile)

• Disk OS

•• Security

• Business Apps

• Web Apps

• Online Apps(Mainframe)

• Manageability

Benchmark Spec (EndUser Profile + SW Spec)

• Benchmark Selection

• Benchmark Analysis

PC Specification

• Mapped toComponents/Config-urations (UserProfiles, Requirements,Functional Specs,Benchmark Analysis)

•• Review Specificationwith Stakeholders

Current State Analysis

• Asset Reports

•• Current TCO

• Operating Costs

• Support Model(Warranty, Repair,SLA)

Budget

• Calculate Budget

•• Submit BudgetRequest

• Capture BudgetTargets

• Adjust BudgetTargets

Page 5: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

Organization and Regulatory Requirements

IT organizations may also need to sat-isfy a variety of regulatory and work-place requirements, which can includethe need to:

• Meet a certain level of energy effi-ciency in new business client devicepurchases

• Ensure workspaces are safe andergonomic

• See that data and information areproperly secured and protected

Certain security measures may be man-dated, such as requiring hard disk en-cryption and keeping business clientdevices current at the latest patch levels.Organizations can also control their costsand significantly reduce deploymenttimes by instituting best practices suchas developing a single software imageclient build, which enables more rapidupdates and operating system upgrades.There may also be organizational pro-

ductivity strategies to support, such asimproved mobility and collaboration,which will have an impact on businessclient device and other hardware andservice selection and integration (e.g.,wireless and cellular capabilities).

User Profiles

Profiling the main categories of businessclient device users in an organizationhelps to quantify unique sets of capabil-ities that need to be deployed to each ofthese communities of users. Types ofuser profiles could include executives,engineers, administrative staff, mobileworkers, task workers, and those withinfrequent device usage, who mightshare a business client device or use acentrally located kiosk.

Standardizing on more capable andhigher-performing device models canhelp an organization lower costs and re-duce infrastructure complexity by limit-ing the number of unique desktop andlaptop configurations deployed andsupported across the enterprise.

Deploying fewer hardware configura-tions lowers IT support costs by reduc-ing training, documentation, and uniqueprocess requirements and minimizes re-pair costs by requiring fewer system andcomponent inventories.

Software Specifications

The IT application load required to en-able collaboration and safeguard thebusiness environment has increased sig-nificantly over time. If it is not managed,this load can consume the entire gener-ation-to-generation performance gainoffered by new business client devices.An understanding and modeling of thisload, and testing to validate the per-formance of this load on planned speci-fications, are critical to ensure againstpremature obsolescence of the device,and to feed into benchmarking tools forplatform comparisons.

Benchmark Specification

With many different types of perform-ance benchmarks, it isn't always easy tochoose the most appropriate one for aspecific planned purchase. At a highlevel, a good performance benchmarkshould always be, at a minimum:

• Relevant (reflecting the usage model)

• Regulated and recognized

• Up to date

Figure 5 shows the types of organiza-tions that develop benchmarks.

Current State Analysis

For an organization to properly assessits future requirements, it needs tohave an accurate picture of its currentstate. This includes:

Figure 5. Who develops benchmarks?

5

Consortium(BAPCo*, SYSmark*, MobileMark*, SPEC*, CPU2006*)

Open Source Community(PovRay*, Lame MP3*)

Independent Software Vendor (ISV)(Doom3*, Unreal Tournament*)

Company(Veritest*, FutureMark*)

Individual(SiSoft*, Sandra*, Super PI*)

Consortia Tap Into Industry Expertise to FosterHealthy Debate during Development Cycle

Page 6: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

6

Business Client Procurement Guide for the Public Sector

• An inventory of business client assets

• Assessing current TCO

• Breaking down the IT organiza-tion’s overall operating costs

• Assessing the current support modelincluding warranty terms and condi-tions, out-of-warranty repair costs, andservice level agreements

Budget

Generally, budget plans for purchasesare driven by organization's expansionand/or planned upgrades of businessclient devices nearing the end of theirlifecycle. The timeframe and volume ofbusiness client device acquisitions overtime are useful in projecting and ap-proving budgets for purchases. Thebudget is also a key item to understandwhere any tradeoffs may need to bemade and the necessary materiality ofany purchase negotiations. PurchasePlan Before preparing an RFP, an organi-zation needs a purchase plan detailing:

• The configurations it needs and inwhat quantity

• A plan or schedule for purchasesto meet the needs of businessclient device replacement and orga-nizational expansion

• The terms and conditions betweenthe organization and the supplier,taking into account warranties andsupport required and any processesthat need to be agreed upon toensure proper and efficient support

RFP

The organization should develop an RFPscorecard detailing the evaluation crite-ria for responses and weighting themaccording to the organization’s priorities.The RFP is then put out to tender andthe responses needs to be mapped tothe evaluation criteria on the RFP score-card. The organization should verify inits laboratory, or have verified in a third-party independent laboratory, the accu-racy of the results submitted, at least onthe short-listed systems.

Procurement Execution

Once a purchasing proposal has beenratified, the work begins to actually buythe business client devices. Dependingon the organization, this will includepurchase timing, setting inventory lev-els, and identifying the target employeesfor the new devices. The organizationneeds to be prepared to deal with theseprocurement details:

• Localization

• Customization

• Duties

• Taxes and fees

• Regulatory approvals for certainspecifications

All these factors can add to or decreasecosts and affect lead time for the purchase.

Depending on the purchase cycle, theorganization may also be specifyingand validating future generations ofbusiness client devices. As part of atypical deployment, it will need to takesteps for a smooth transition for em-ployees to their new systems. Schedul-ing and planning resources for thedevice rollout should be done up-front,taking advantage of economies of scalewhere appropriate.

Care must also be taken for applicationand data migration and training on anynew tools or business client device fea-tures to improve employee productivity.

Finally, as the older systems are re-placed, a good plan for asset decommis-sion is essential to protect data (ideally,by removing and destroying the harddrives) and maximizing any residual dis-posal value for the device.

Figure 6. RFP and Procurement

Purchase Plan

• Configuration

•• Quantity Estimates

• Purchase Schedule

• Terms and Conditions

RFP

• Develop RFPScorecard andDocument RFPProcess

•• Solicit SupplierParticipation

• Map Responses toRequirements

• Score RFP Responses

Procurement

• Award Contract

•• Allocate Funds

• Procure

• Deploy

Page 7: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

Planning Ahead for the Optimal Configuration

One of the most challenging impacts toproductivity is an underpowered systemthat hasn’t yet reached its forecasted re-fresh time. Properly scaling the capabili-ties of a new business client device—such as memory, storage, architecturalenhancements across CPU generations,and network connectivity—will help meetend users’ performance and productivityneeds until the next refresh cycle.

Figure 7 shows how business needs, andtherefore business client devices, havechanged. Besides considering hard op-erational costs that form part of a TCOmodel, it is also important to analyzethe potential business value resultingfrom soft benefits such as:

• Higher worker productivity

• Enhanced stakeholder collaboration

• Faster response times

• Performance headroom for futureapplications

Supporting mobile users, for instance,can bring productivity and businesscontinuity benefits, allowing employeesto be productive even when they can’tget to the office. Mobile devices canoften provide a lower-cost option for ITas well, consuming less power and, de-pending upon the configuration, beingless expensive to service, since they maynot require a deskside technician visit.

Bring Your Own Device

The increasing use of consumer devices,technologies, and usage models shapesemployee expectations of their work en-vironment. IT consumerization is the in-creasing influence of the technologyexperiences in our personal lives—bothhardware and applications—on thetechnology we expect to use at work.Many employees today bring their owncomputer, tablet, or other consumer de-vice to the workplace. Whether an IT organ-ization supports it or not, consumerizationis a part of the ecosystem and what drivesand motivates employees.

Employees can more rapidly adopttechnologies in their personal lives thanat work. They have control over thetechnologies, and most importantly theyhave a choice. IT organizations need tolook at the user experience their em-ployees are expecting and make surethey are bringing in the capabilities tosupport that. Despite the proliferation ofpersonal devices and new form fac-tors—from smartphones to tablets—Intel still recommends the PC, including 2in 1 devices called convertibles and de-tachables that blend the best design at-tributes of different form factors, as thebest choice to support the multitude ofusage models essential to government.

Creating Flexible Environments for ITService Delivery

The balancing act between user empow-erment and IT control is even more of anissue as business becomes increasinglymobile and devices proliferate. Manycompanies are now looking to desktopvirtualization to improve service deliverywhile maintaining security, retaining man-agement control, and containing costs.

Figure 7. Business needs have changed;therefore, the PC business has changed.

7

Page 8: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Benefits of Intelligent Clients for Desktop Virtualization

IT must find the right balance be-tween the data center and desktopsto create an infrastructure thatmeets unique organizational needs(Table 1). Using intelligent clients asendpoints in a desktop virtualizationenvironment can convey benefits toboth IT and the end users it serves:

• Better user experience.Executing locally offers betterperformance and responsive-ness because computation isdone closest to the end user,where it can fully utilize theclient’s capabilities.

• Mobility. Laptop PCs orUltrabook™ devices, when com-bined with ISV solutions thattake advantage of client-sidehypervisors, can enableemployees to work anywhere,online or offline, with fullaccess to applications.

• Better economics. Local com-putation can offer better eco-nomics than centralized execu-tion, with client-side processingfor compute-intensive work-loads. This balanced approachcan help reduce data centerresources such as redundant,high-performance servers, stor-age, networking, and the associ-ated power and cooling.

• Flexibility (investment pro-tection). PCs with greaterperformance have the flexi-bility and headroom toaccommodate future appli-cations or business models.

sider as they evaluate different clientcompute strategies:

• Business considerations. TCO/ROI,business continuity, IT efficiency, andend-user productivity

• User experience. Performance,responsiveness, mobility, high band-width wireless, personal use/owner-ship, and privacy

• Workload. Compute load, graphicdemands of applications used, head-room for application growth, delaysensitivity (e.g., video, motion graphics,voice over IP [VoIP]), Web server load)

Server-hosted desktop virtualization is nota cure-all for common IT headaches like re-ducing the number of images, maintainingsecurity, or managing devices effectively.The key to successful desktop virtualizationis a cost-effective IT implementation thatenables users to meet organizational objec-tives. A good place to start is profiling theuser base. Understanding employees’ soft-ware and capability needs will help an ITmanager know which applications it makessense to centralize and which to install lo-cally. It’s helpful to segment users by tasksperformed and applications used. Here’s alist of factors an organization needs to con-

Application Execution

ApplicationData Storage

Local DeviceConnect andSynch (BarCode Reader,PDA, Phone)

Full Windows*App Support(Including VoIPand Rich Media)

Full Support forWindows XP,Windows Vista,Windows 7, andWindows 8

Off-NetworkMobile Option

Typical Clients

RemoteDT

SessionHost

Server

DataCenter

Partial(VendorSpecific)

Partial(VendorSpecific)

Partial(VendorSpecific)

No

Terminal(PC

Specific)

VirtualHostedDesk-top

Server

DataCenter

DataCenter

Partial(VendorSpecific)

Partial(VendorSpecific)

No

Terminal(PC

Specific)

BladePCs

Server

DataCenter

DataCenter

Partial(VendorSpecific)

Partial(VendorSpecific)

No

Terminal

OSImageStreaming

Client

DataCenter

Yes

Yes

Yes

No

PC

AppStreaming

Client

Client orServer

Yes

Yes

Yes

Yes

PC

VirtualCon-tainers

Client

Client orServer

Limited

Partial(VendorSpecific)

Yes

Yes

PC

Trad.PC

Install

Client

Client

Client

Yes

Yes

Yes

PC

Table 1. Desktop virtualization model comparison

Business Client Procurement Guide for the Public Sector

8

Page 9: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

9

Business Client Procurement Guide for the Public Sector

Table 2. Consumption versus productivity for tablet devices

Capability

Internet Browsing

News, Weather, and Sports

eReader (e.g., Kindle*, Nook*, Kobo*, Stanza*)

Camera and Photo Viewer

Light Productivity (e.g., Email, Calendar)

Entertainment (e.g., Music, Movies, Games)

Social Media (e.g., Twitter*, Facebook*, Instagram*)

Light App Support

Public Ecosystem Store (e.g., Apps, Content)

Flexible/User-Controlled File System

USB and Removable Storage

Off-Screen Keyboard, Mouse, and Pen Input

USB and Peripheral (e.g., Headset, Keypad, Webcams)

Multi-Monitor and Side-by-Side App Support

Multitasking and Multiprocessing

Enterprise Productivity (e.g., Microsoft Office*, IBMNotes*, Novell GroupWise*)

Access to Corporate Servers (e.g., AD, File/Print, SMB)

Enterprise Class Applications (GIS, CRM, ERP, CMS, etc.)

Enterprise Store and Software Distribution (e.g., Apps,Content)

Enterprise Social (e.g., Yammer*, SharePoint*, Jive*, Chatter*)

Enterprise Security (e.g., VPN, AD Authentication, Multi-factor Authentication, TPM)

based user interface, these devices pro-vide great benefits to mobile users.However, it is important to understandthat these devices are targeted for con-sumers. Many task workers and businessusers are trying to adapt these new mo-bile work styles into their working lives.While these consumer-based tablets areeffective as companion devices, theyoften cannot meet all the needs oftoday’s business users.

Today, business users no longer have tosettle for consumer-based tablets thatrequire them to have a second devicelike a laptop or desktop to completetheir daily tasks. Windows* 8.1 and Win-dows 8.1 Professional devices have thinand light designs, a variety of styles, andlong battery life. These devices are builtfor and supported by businesses, with afull range of enterprise capabilities.These 2 in 1 or hybrid devices can alsoprovide a lower TCO, with lower soft-ware, security and maintenance ex-penses. Table 2 compares and contrastsusage models.

Security

Today’s fast-changing business land-scape is taking client security challengesto a new level. Threats have grown farmore advanced, from rootkit attacks tointernational security breaches andeverything in between. The evolution ofa more mobile and socially connectedworkforce is driving IT to adopt new de-livery models such as cloud computingand desktop virtualization. Complicatingmatters are tech savvy workers puttingpressure on IT to support new mobileclients with seamless connectivity.

To meet these needs with agility andstay ahead of sophisticated securitythreats, organizations need a compre-hensive business client security solu-tion. That solution must address thethree pillars that define IT security formost enterprise operations:

Consump-tion Tablet

ProductivityTablet/Hybrid

Consumption versus Productivity forTablet Devices

Tablet devices running on the iOS* andAndroid* operating systems have be-come mainstream and are changing theway we use technology. With instant-on,long battery life, and a simplified, touch-

• IT considerations.Existing infrastruc-ture versus infrastructure needed tosupport the virtualization model;servers; storage; data center space,power, and cooling; network bandwidth;manageability; disaster recovery; imageand license management

Page 10: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

10

Business Client Procurement Guide for the Public Sector

• Threat management

• Identity and access

• Monitoring, reporting, and remediation

Software-based solutions are at thefoundation of most PC security manage-ment systems, but there’s a way to increasethat protection below the operating sys-tem. An intelligent processor with em-bedded security technologies, such asthe 3rd and 4th generation Intel® Core™vPro™ processors, can work across eachpillar to provide added layers of protec-tion that strengthen existing PCsecurity.1, 2

Threat Management

The first line of defense, threat manage-ment, starts with the prevention ofviruses and malware. Although soft-ware-based solutions have been a suc-cessful prevention resource, today’sescalating threat landscape requires anew approach to address advanced per-sistent threats and an explosion of mal-ware. Adding to the complexity arevirtualized computing environmentsthat bring a wealth of advantages to IT,yet present unique security risks.

With embedded security technologiesthat perform regular integrity checks onclient system components, you can ac-tively prevent viruses and malware fromentering your network. These technolo-gies work below the operating system tovalidate the behavior of key client sys-tem components at startup. This worksto prevent threats, and also establishesa root of trust to create a protected,measured launch environment.

With hardware-assisted security protec-tion, if a system faces a virus or malwareattack, hardware protection could beavailable inside the system to isolate thesystem from its environment. Yet itwould still allow an IT administrator toaccess the system through its network

threats, despite the number of corpo-rate users on the go. For example, ifyou have a user who is traveling andsuddenly unable to log in, you mightsuspect their PC has a virus. Securitybreaches like this can occur any time,whether the user is sitting in their officeor traveling, and can lead to potentialdata loss. When a breach does occur, ITneeds the ability to respond at anytime, with the right resources in placefor remediation. In today’s business en-vironment, deskside visits are not al-ways a realistic support option and canbe very costly.

With remote support and monitoring ca-pabilities embedded into the processor,help desk staff can access and controlthe user’s computer to resolve issuesthrough all states including reboot. ITcan work proactively to manage threatsby pushing security updates to usersbefore a breach occurs and then diag-nose, isolate, and repair infected clientsafter a breach takes place.4

Form Factors

Purpose-built business systems areavailable in a wide range form factors:

• Desktop systems

• Notebooks

• Ultrabook™ devices

• 2 in 1 devices

• Tablets

To get the best value, it is important to con-sider how the device will be used, including:

• Operating system

• Applications

• Performance

• Security and connectivity

communications to perform diagnostics toverify if the security breach is real, andthen to perform maintenance. So it wouldisolate the issue to that one system andmitigate maintenance and down timemore broadly across the network.

To state it simply, software protection islike a bouncer at a bar with no addi-tional level of security. Hardware protec-tion takes it to the next level, where it islike a bouncer standing in front of a se-cure, locked door. The door would firsthave to be unlocked (the hardware pro-tection) in addition to the software pro-tection (the bouncer) doing its job.

Identity and Access

The next line of defense, identity andaccess, is about strengthening authen-tication and protecting passwords. Inthe enterprise, strong authentication isno longer an option, but is a require-ment. Whether it is for securing virtualprivate network (VPN) access or pro-tecting access to software as a service(SaaS) applications, user name andpassword can no longer provide viablesecurity on their own.

Intel® Identity Protection Technologyhelps enterprise IT departments protecttheir access points while reducing costsover traditional hardware token orsmartcard methods. This security tech-nology is embedded in the processorand works with industry leading authen-tication providers to support hardware-based storage of their tokens orcertificates. Because the credential is se-cured inside the platform, it cannot becompromised or removed from a partic-ular PC.3

Monitoring, Reporting, and Remediation

This last line of defense extends acrossall aspects of IT security management.With the right monitoring and remedia-tion tools in place, IT organizations canstay one step ahead of critical security

Page 11: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

11

Business Client Procurement Guide for the Public Sector

Form Factors

Desktop: For regular use at a singlelocation, this category includestower, small-form-factor, and all-in-one designs.

Notebook: For mobile use, theseversatile, portable computers have aclamshell design.

Ultrabook™: These thin and lightnotebooks deliver maximum re-sponsiveness, long battery life, andhardware-based security.

2 in 1: These versatile designs canfunction like a tablet when you wantit or a PC when you need it. Thereare two types: convertibles and de-tachables. Convertibles have a per-manently attached keyboard thatcan flip over, twist, or slide to use asa tablet when desired. Detachablesfeature a keyboard that can easilydetach to use the device as a tablet.

Tablet: These ultra-mobile comput-ers combine the display, circuitry,and battery into a single unit.

These considerations are important forall device categories.

Desktop Systems

Desktops are intended for regular use ata single location. They are available in avariety of case sizes including tower (lo-cated on the floor under or beside thedesk), horizontal case (located on thedesk either below or beside the monitor),small-form-factor designs, and all-in-onedesigns. All of these devices have a key-board, mouse (or other pointing device),and monitor attached to the device.

An all-in-one device integrates the mon-itor, the computing device, and a key-board into one case. Most of today'sall-in-one systems have touch-enabledscreens. The advantage of all-in-ones isthat the user gets the full, powerful ca-pabilities of a complete desktop systempackaged into one sleek device.

A sub-category of all-in-one systems isportable all-in-ones, which include arechargeable battery in a sleek, portabledesign the user can move around the of-fice. Portable all-in-ones are especiallygood for teams that need to huddlearound the device and confer.

Another rapidly emerging category ofinnovative desktop designs is the ultra-small form factor. These very compactPCs can be placed unobtrusively in thecorner of a desk, attached behind amonitor, or even placed inside theworker’s desk drawer. Today’s process-ing power and small components enablethese compact devices with amazinglygood performance. The small compo-nents enable significant memory andstorage capacity for a no-compromisecompute experience.

Notebooks

A notebook is a computer in a clamshelldesign for mobile use. It has most of thesame components as a desktop com-puter, including a display (typically 13.3,

special class of notebooks. Ultrabooksare very thin and light notebooks withmaximum responsiveness, long batterylife, and hardware-based security. Lessthan three-quarters of an inch (21mm)thick, Ultrabook devices (especiallythose built on the Intel® vPro™ platform)provide full PC functionality and enter-prise-class security in an ultra-mobilepackage. An enterprise-class Ultrabookcan provide the performance of a laptopwith tablet-like features such as sleekdesign, instant-on, always connected,and easy software delivery.

14.1, or 15.6 inches), keyboard, touchpad(pointing device), webcam, microphone,and speakers integrated into a singleunit. The CPU, memory, hard drive, andconnectivity all reside in the base of thedevice, under the keyboard. A notebookis powered by a rechargeable battery(charged by an AC adapter). Notebooksare also sometimes called laptops.

Ultrabook™ Devices

The Ultrabook™ is a class of devicestrademarked by Intel that represents a

Desktop

Notebook

Ultrabook™

2 in 1

Tablet

Page 12: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

12

Business Client Procurement Guide for the Public Sector

Innovative Ultrabook designs havemoved beyond the simple clamshell to2 in 1 designs, which are a hybrid of alaptop and a tablet. Input methodsoften include touch in addition to thetraditional keyboard and mouse. SomeUltrabook models have extended to in-clude voice and gesture interfaces.

tablet. Typically, a detachable has a key-board engineered as part of overall prod-uct design and not as an aftermarketaccessory. It attaches or detaches to thedisplay mechanically or magnetically.

Convertible models have screens thatcan swivel, roll, pull back over the key-board, or fold back 360 degrees so thatthe display is on the back, with an openkeyboard on the other side. Typically, aconvertible has a keyboard permanentlyand mechanically attached to the display.

Many 2 in 1 devices meet the require-ments to be categorized as Ultrabooks.There are also many non-Ultrabook 2 in1 devices available.

Tablets

A tablet is a mobile computer with dis-play, circuitry and battery in a singleunit. Tablets are typically equipped withsensors (such as a camera, microphone,accelerometer, and touchscreen), withfinger or stylus gestures replacing acomputer mouse and keyboard. Tabletsmay include physical buttons (e.g., tocontrol basic features such as speakervolume and power and ports) for net-work communications and to charge thebattery. An on-screen, pop-up virtualkeyboard is typically used for typing.Tablets are typically larger than smartphones or personal digital assistants(PDAs) at 7 inches (18 cm) or larger,measured diagonally.

There are many business tablets avail-able today. These devices are designedspecifically for mobility, long batterylife, and application compatibility insleek and exciting form factors. They areeasily integrated into existing IT man-aged environments across all segments.Some models are available on the Win-dows 8.1 operating system; others areavailable on the Android or iOS operat-ing system.

Enterprise Ultrabook devices are a goodfit for employees who need to carrytheir computing device with them. Ultra-book features include:

• Remote management and security

• Reliable and responsive storageusing solid-state drives

• Flexible, reliable connectivity any-where and any time

With a design that provides for durabil-ity and reliability, Ultrabooks should bewell suited to multi-year refresh cycles.

2 in 1 Devices

The 2 in 1 device is a cross between anotebook and a tablet, offering flexibilityfor those who want the productivity of aPC combined with the convenience of atablet. There are many factors driving theneed for 2 in 1s in business. The work-place and schedules are evolving, withworkers no longer going to a desk andworking from 8 a.m. to 5 p.m. Today,work and personal lives tend to be muchmore intertwined. Workers have to multi-task much more than they used to. Theyneed to be effective and productive inmore places and a variety of times.

According to a 2012 Forrester study, 60percent of business workers today carryat least three devices. In another study,employees said they were carrying moredevices to be more productive and effi-cient at their work.5 With a 2 in 1 device,a user doesn't need to carry around twoseparate devices.

There are two basic categories of 2 in1 devices:

• Detachable

• Convertible

Detachables have screens that detachfrom the keyboard, so an employee cancarry just the screen and use it as a

Intel® vPro™ Technology:Built-in Security

Today’s businesses and intelligentsystems developers face four criticalareas of IT security:

• Threat management, includ-ing protection from rootkits,viruses, and malware

• Identity and website accesspoint protection

• Confidential personal andbusiness data protection

• Remote and local monitor-ing, remediation, and repairof PCs and workstations

Intel® vPro™ technology ad-dresses each of these—and otherneeds—through its comprehen-sive set of security, manageabil-ity, and productivity-enhancingcapabilities. This technology isbuilt into the Intel® Core™ vPro™processor family, the Intel® Xeon®processor E5-2600, E5-1600,and E3-1200 product families,Intel® chipsets, and networkadapters that simplify and accel-erate these four critical IT functions.

Page 13: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

13

Business Client Procurement Guide for the Public Sector

Platform Features and Benefits

Additional examples of CPU and com-puter system features unrelated to per-formance, including hardware-assistedsecurity, reliability and manageability,are provided in Table 3.

in software) is that they can extend thefunctionality because they are not af-fected by factors such as softwareviruses or rebooting PCs.

Many of the features described areavailable only in Intel® processors, whichoften incorporate certain features di-rectly into the hardware itself. The bene-fit of hardware-assisted features (ascompared to features implemented only

Platform Features and Benefits

Hardware-assisted remote discovery, wake-up, and control of keyboard, video, and mouse(KVM) with out-of-band system access

Some processors and chipsets contain built-in capabilities that, combined with supportingsoftware, can allow IT managers to remotely discover, access, heal, and protect their net-worked computer systems via out-of-band system access that is independent of the state ofthe operating system or power state of the PC. These capabilities are sometimes availableeven with PCs that lack a working operating system or hard drive or are turned off (providedthe computer system is connected to a power source and an active LAN port). These capabil-ities would allow IT departments to:

• Remotely control a PC’s KVM, even in a pre-OS state

• Maintain persistent control and visibility, even through PC reboots

• Reboot a PC to an alternative image, such as those on a network share, to enable IT todiagnose and repair PC issues remotely, even if the PC's operating system is unavailable

• Wake powered-down PCs for off-hours patching, helping reduce downtime and main-tain end-user productivity with less disruptive, remote lights-out security patch andsoftware application updates

• Enable PCs to be powered down during off hours without compromising IT’s ability todeliver off-hours patches

• Improve inventory tracking and achieve a better asset management

• Improve manageability and system/network security by making it easier to keep soft-ware and virus protection consistent and up-to-date across the organization

• Minimize deskside visits and reduce IT support costs

Table 3. Platform features and benefits

Desktops Notebooks Servers

Page 14: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Platform Features and Benefits

Hardware-assisted identity protection technology

Protecting user identity and business data stored in the cloud requires strong authentication.Hardware-based authentication is widely regarded by security experts as a more effective ap-proach than software-only authentication:

• Two-factor, hardware-based authentication can prevent unauthorized access to impor-tant personal or organizational accounts while reducing the cost and complexity ofother hardware solutions (e.g., external tokens or fobs).

• Hardware-based authentication provides a simple way for websites or organizations tovalidate a legitimate user (i.e., not malware) is logging in from a trusted PC.

• Authentication can be implemented in several ways, including a one-time password(OTP) or support for a public key infrastructure (PKI).

• With the OTP method, a unique, one-time use number (often six digits) is frequentlygenerated (e.g., every 30 seconds) from an embedded processor that is tamper-resistantand operates in isolation from the operating system. Moreover, because the credential isprotected inside the system’s chipset, it is not likely to be compromised by malware orremoved from the PC.

• Access points can also be protected via PKI, which embeds a PKI certificate (similar tothe OTP credential) into the chipset but can help save organizations the additional costand complexity of supporting traditional smart card or token storage options.

• Encrypted I/O technologies can also protect the display of Web-based interactions ortransactions. This technology would complement the OTP or PKI capabilities to confirmuser presence, verify transactions, and protect a PC’s display from malware scraping byfirst creating a secure PIN input prior to the release of credentials.

Hardware-assisted encryption/decryption acceleration technology

Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI) is an encryption stan-dard widely used across the software ecosystem to protect network traffic, personal data,and organizational IT infrastructure. AES is a symmetric block cipher that encrypts/decryptsdata through several rounds. Computing hardware can implement some of the complex andperformance-intensive steps, accelerating the execution of the AES algorithm.

Table 3. Platform features and benefits (continued)

Desktops Notebooks

Desktops Notebooks Servers

Business Client Procurement Guide for the Public Sector

14

Page 15: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Platform Features and Benefits

Hardware-assisted virtualization technology

Virtualization technology enhances security, improves manageability, and increases systemand network availability, limiting downtime and maintaining worker productivity. At its sim-plest, virtualization allows a single platform to run multiple operating systems and applica-tions in independent partitions at once without incurring significant emulation costs. Withvirtualization, one computer system can function as multiple virtual systems.

Virtualization has emerged as a compelling technology for server platforms, leading to lowerhardware acquisition costs as well as improved performance efficiency. In a data center, forexample, multiple servers could be combined into one system, running different applicationsand operating systems, providing advantages for IT tasks such as server consolidation,legacy migration, and live migration.

Client platforms are also increasingly utilizing virtualization technology to enable securepartitions for system backup and security features. For example, IT managers could isolatea portion of a managed PC to perform system upgrades and maintenance without inter-rupting the end user. IT managers could also create one desktop PC build that can func-tion independently as both a business and personal system, keeping software loads andvirus attacks separate, or one that runs different operating systems and software for dif-ferent or legacy tasks.

The virtualization technology of some CPUs and chipsets improves the robustness, reliability,and performance of software-only virtualization solutions.

Hardware-assisted data execution disabling technology

When combined with a supporting operating system, the data execution disabling technology ofsome CPUs and chipsets can prevent certain classes of malicious buffer overflow attacks.

In a typical attack, a malicious worm creates a flood of code that overwhelms the processor,allowing the worm to propagate itself to the network, and to other computers.

Malicious buffer overflow attacks pose a significant security threat to businesses, increasingIT resource demands and, in some cases, destroying digital assets. These attacks cost busi-nesses precious productivity time, which can equal significant financial loss.

Data execution disabling technology allows the processor to classify areas in memory bywhere application code can execute and where it cannot. When a malicious worm attemptsto insert code in the buffer, the processor disables code execution, preventing damage andworm propagation.

Hardware-assisted data execution disabling technology contributes to significantly improvingsystem and network security, reliability, and availability. In addition, by reducing the need forsoftware patches aimed at buffer overflow attacks and for virus-related repairs, it frees IT re-sources for other initiatives.

Table 3. Platform features and benefits (continued)

Desktops Notebooks Servers

Desktops Notebooks Servers

Business Client Procurement Guide for the Public Sector

15

Page 16: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

16

Platform Features and Benefits

DDR3 and its permutations (DDR3L, DDR3L-RS, LP DDR3) or FBDIMM system (or main)memory

Last-generation system (or main) memories based on the standards DDR2, DDR3, or FBDIMMenable greater performance and reduced power consumption.

In addition, a computer system (especially a server) with DDR3 (or its permutations) or FB-DIMM main memory is much easier to upgrade in the future, since these are likely to be thenew industry standards for multiple generations.

Warranty, after-sales services and support

Warranty, after-sale services and support, including training, should also be carefully consid-ered. This may be particularly important for servers, which generally need maintenance andupgrades over their lifetime.

Guarantee of a stable image hardware platform for at least 15 months

As IT managers deploy client systems in the enterprise, unexpected changes to the previ-ously qualified platform can force software image revisions and hardware requalifications.The increased complexity of the client environment can raise hardware support and imagemanagement costs.

A stable image hardware platform is a standardized configuration for key hardware compo-nents of desktop and notebook PCs (i.e., processor, chipset, and wired/wireless LAN) and ref-erence drivers that IT departments can deploy into the organization for a set period of time,usually 15 months.

During this time, IT managers can develop and maintain a standardized software image con-sisting of an operating system, hardware drivers, and application software that can be loadedon any new PCs deployed into the environment without concerns about compatibility be-tween the hardware and software.

The guarantee of a stable image hardware platform enables greater software image stability andhelps IT departments reduce the number of system qualifications and client configurations in theenvironment, resulting in lower hardware support costs and improved IT responsiveness.

Table 3. Platform features and benefits (continued)

Desktops NotebooksServers

Desktops NotebooksServers

Desktops Notebooks

Page 17: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

17

Platform Features and Benefits

Battery life and mobility form factor

The usefulness of a mobile PC is directly related to its portability and the longevity of its bat-teries. So is the level of productivity of the mobile worker.

Experience suggests that notebooks should not exceed four pounds in weight and one inchin thickness, while providing a minimum battery life of at least five hours under BAPCo Mo-bileMark* 2007.

For systems that meet Ultrabook requirements, the weight is typically less than three poundsand less than or equal to 18mm (approximately 0.71 inches) thick, while providing a mini-mum battery life of eight hours under BAPCo MobileMark 2007.

Solid-state drives

Intel recommends considering solid-state data storage devices that support hardware-basedOpal* security features and have self-encryption capability. Opal is an industry standard de-veloped by the Trusted Computing Group (TCG) to manage access to drives within an enter-prise environment and simplify remote password management. The TCG developed thestandard as an extension of the existing ATA command set used to support PC drives, makingit easy to migrate to over time. Most enterprise applications used today to manage storageand security of client storage drives support Opal. Since the Opal compliant security drivefeatures are hardware-based and support industry standards, performance is not compro-mised and they are easy to manage.

Integrated wireless local area network (LAN)

Wireless connectivity gives users new ways to stay productive and efficient as they movethrough fast-paced work days, both in and out of the office.

Notebooks with integrated wireless LAN and supporting software enable users to seamlesslyconnect to the intranet or Internet whenever a wireless LAN hotspot is available. This pro-vides greater flexibility and freedom to work on the go.

Table 3. Platform features and benefits (continued)

Notebooks

Desktops Notebooks

Notebooks

Page 18: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

18

Platform Features and Benefits

Automatic redundant processor booting, hot-spare parts, hot-swap parts, and memory mirroring

One key server measurement is its percentage of up time. This determines the time theserver is available for users to access and the amount of unplanned downtime per year thatthe server may experience. Unplanned downtime can result from a number of different fac-tors including hardware failure, software problems, or operator errors.

Automatic redundant processor booting, hot-spare parts, hot-swap parts, and memorymirroring can all help increase server reliability and help minimize the possibility of un-planned downtime.

Automatic redundant processor booting is a capability of some multiprocessor servers that,in case of system boot failure by the primary boot processor, automatically enables the sys-tem to reboot from other processor(s) installed on the system, maintaining high availabilityfor mission-critical applications.

Hot spare parts are redundant components within a server that are powered on but not ac-tively functioning in the system. In case of failure, a defective component is automatically re-placed by a hot-spare component with no disruption for the server or the application.

Parts identified as hot-swap are able to be changed (swapped) without having It having toturn off the server.

Public procurement authorities should request that servers be equipped with as many hot-spare or hot-swap elements as possible. The main hot-spare/hot-swap parts in a server are:

• Power source

• Fans

• Hard-drives

• Main memory

Mirroring is a technique used to protect the data stored in memory (hard disk or main mem-ory). Mirroring provides the ability to duplicate the contents (from main memory or hard-disk) in a second memory or hard-disk array so that if one array fails, data is not lost and isinstantly available to users, preventing any server downtime.

Table 3. Platform features and benefits (continued)

Servers

Page 19: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

19

Good/Better/Best Comparison

Tables 4 and 5 show a good/better/bestcomparison of Intel products and key fea-tures they provide for your organization.

ership in its evaluation of client systemswill ultimately result in overall improve-ment in an organization’s bottom line.

Learn More

For more insights, research, and reports,and to connect with your peers and ITexperts at Intel, visit the Intel.com ITCenter (www.intel.com/itcenter).

Conclusion

Public sector organizations and enter-prises need to manage client computingplatforms as strategic assets with a sig-nificant impact on workforce productiv-ity. A holistic IT procurement approachthat looks beyond initial acquisitioncosts and focuses on total cost of own-

Performance

Manageability

Security

Graphics/Media

Table 4. Good/better/best comparison

Single- or Multi-CoreProcessing Power

Intel® VirtualizationTechnology

Processor Graphics

Multi-Core Processing Power

Intel VirtualizationTechnology

Processor Graphics

Multi-Core Processing Power

Intel VirtualizationTechnology

Intel® Identity Pro-tection Technology(Intel® IPT)

Intel IPT with pro-tected transactiondisplay (PTD)

Intel IPT with one-time password(OTP)

Processor Graphics

Multi-Core Processing Power

Intel® Turbo-BoostTechnology

Intel® vPro™Technology

Intel® Active Man-agement Technology

Intel VirtualizationTechnology

Intel® Stable ImagePlatform Program

Intel IPT

Intel IPT with PTD

Intel IPT with OTP

Intel IPT with public key infra-structure (PKI)

Processor Graphics

Multi-Core Processing Power

Intel Turbo-BoostTechnology

Intel vPro Technology

Intel Active Manage-ment Technology

Intel VirtualizationTechnology

Intel Stable ImagePlatform Program

Intel IPT

Intel IPT with PTD

Intel IPT with OTP

Intel IPT with PKI

Processor Graphics

Good BestBetter

Intel® Celeron® Processor

Intel® Pentium® Processor

Intel® Core™ i3 Processor

Intel® Core™ i5 vPro™ Processor

Intel® Core™ i7 vPro™ Processor

Page 20: Business Client Procurement for the Public Sector€¦ · Business Client Procurement Guide for the Public Sector How to Select the Right Client Computing Platform for your Needs

Business Client Procurement Guide for the Public Sector

Table 5. Intel technologies and features

Technology Description

Intel® Active Management Technology(Intel® AMT)

Intel® Advanced Encryption StandardNew Instructions (Intel® AES-NI)

Intel® Identity Protection Technology(Intel® IPT)

• Intel IPT with public key infra-structure (PKI)

• Intel IPT with one-time password(OTP)

• Intel IPT with protected transac-tion display (PTD)

Intel® Stable Image Platform Program(Intel® SIPP)

Intel® Trusted Execution Technology(Intel® TXT)

Intel® Turbo-Boost Technology

Intel® Virtualization Technology (Intel® VT)

Hardware-assisted manageability to access PCs when they’re turned off or inoperable

Hardware acceleration for encryption/description operations

Hardware-assisted identity protection technology. Available with two-factor authenti-cation for organizations with PKI environments, with OTP, and with PTD for protectionagainst phishers or keyloggers.

Publishes a set of hardware components that are available for at least 15 months.

Protects confidentiality and integrity of business data against software-based attacks.

Automatically allows processor cores to run faster than the base operating frequencyif they’re operating below power, current, or temperature specification limits.

Provides flexibility and maximum system utilization by consolidating multiple PC operatingenvironments. Intel VT-x is hardware technology that enables and speeds up the transfer ofplatform control between the guest operating systems and the virtual machine manager(VMM) hypervisor. Intel VT-d is for directed I/O, providing additional flexibility and security.

Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of anyfeatures or instructions marked “reserved” or “undefined.” Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts orincompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information.The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifi-cations. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and be-fore placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may beobtained by calling 1-800-548-4725, or by visiting Intel’s Web site at www.intel.com.

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYS-mark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors maycause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, includingthe performance of that product when combined with other products.

Copyright © 2014 Intel Corporation. All rights reserved. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

*Other names and brands may be claimed as the property of others.

Printed in USA DO/SS/0614 Please Recycle

1Intel® vPro™ technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environ-ment. To learn more visit http://www.intel.com/technology/vpro/

2No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors and may require additional software, hardware, servicesand/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details. 3No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel® Core™ processor, enabled chipset,firmware, and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visithttp://ipt.intel.com.

4 No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware, and software, and a subscription with a capable service provider. Consult your system manu-facturer and service provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visithttp://www.intel.com/go/anti-theft.

5 Forrsights Workforce Employee Survey, Q4 2012," Forrester. http://www.forrester.com/Forrsights+Workforce+Employee+Survey+Q4+2012/-/E-SUS1671.

INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTYRIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DIS-CLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE,MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARENOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR.