client security: new intel processors with embedded security · intel® vpro™ technology is...
TRANSCRIPT
![Page 1: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/1.jpg)
Client Security:
New Intel Processors Come
with Embedded Security
Speakers
Yasser Rasheed, Director of Business Client Architecture
John Mahvi, Intel IT Client Product Line Manager
Moderated by Jason Kennedy, Director of Enterprise Platform Management
![Page 2: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/2.jpg)
Comprehensive Security Features
Threat Management
Identity and Access
Data and Asset Protection
Monitoring and Remediation
No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors may require additional software, hardware, services, and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details.
![Page 3: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/3.jpg)
![Page 4: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/4.jpg)
![Page 5: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/5.jpg)
![Page 6: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/6.jpg)
![Page 7: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/7.jpg)
![Page 8: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/8.jpg)
![Page 9: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/9.jpg)
Built for Business. Engineered for Security.
Innovative Ultrabook™, Mobile and All-in-One Designs
Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: www.intel.com/technology/vpro.
![Page 10: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/10.jpg)
Today’s experts:
−Yasser Rasheed and John Mahvi
Submit your questions:
− Ask questions at anytime by pressing the ‘Questions’ tab at the top of the
player.
More information:
− Check out the Intel IT Center Client Security page to explore many more
resources available to you! www.intel.com/pcsecurity
Download content:
− Click the ‘Attachments’ tab for today’s slides.
− Visit www.intel.com/itcenter/events for Q&A doc later this week
Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Sponsors of Tomorrow., and the Intel Sponsors of Tomorrow. logo are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Microsoft and PowerPoint are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
![Page 11: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/11.jpg)
![Page 12: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/12.jpg)
![Page 13: Client Security: New Intel Processors with Embedded Security · Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results](https://reader035.vdocuments.mx/reader035/viewer/2022080720/5f79a80798192854c4741456/html5/thumbnails/13.jpg)