Intel vpro Technology: Proven Value in Four Use Cases
|
|
- Kory Floyd
- 6 years ago
- Views:
Transcription
1 White Paper Intel IT IT Best Practices Intel vpro Technology March 2013 Intel vpro Technology: Proven Value in Four Use Cases Executive Overview In each use case, Intel vpro technology reduces management costs and decreases employee downtime resulting in greater employee productivity. Omer Livne vpro AMT Product Manager, Intel IT Steve Taylor Sr. Solution Architect, Business Client Platform Division Avi Zarfaty IT Strategic Finance Analyst, Intel IT To increase our ability to maintain, manage, and protect PCs while decreasing management costs, in 2011 Intel IT completed deployment of Intel vpro technology on Intel s client PCs. Intel vpro technology provides out-of-band (OOB) manageability, by implementing Intel Active Management Technology (Intel AMT). Intel AMT s OOB management operates at the firmware level and provides the following benefits: Enables the control of client PCs regardless of OS state, even in a pre-boot environment Makes client management less susceptible to issues that affect the OS Allows remote access to the PC including BIOS settings regardless of the system s power state or OS condition We evaluated the business value of four use cases based on Intel vpro technology that have been deployed at Intel: Enterprise-scale solution for remote management of self-encrypting drives. Using Intel AMT to remotely access the BIOS enables us to create an end-to-end solution to manage hardware-based whole-disk encryption. Remote passphrase reset. Service Desk technicians can access a PC s user interface remotely OOB, including on-screen error messages. This allows them to repair systems directly instead of having to talk employees through a diagnostic and repair process over the phone. Keyboard-Video-Mouse (KVM) Remote Control. Service Desk technicians can use hardware-based KVM Remote Control to diagnose and repair PCs even when the OS is non-functional. ISO mounts. Service Desk technicians can use Integrated Drive Electronics Redirection to boot from an ISO image, perform OS installs, share a drive remotely, or access the Microsoft Windows* Preinstallation Environment. In each use case, we found that Intel vpro technology reduces management costs and decreases employee downtime resulting in greater employee productivity. For example, Intel vpro technology reduces the time to resolve passphrase reset problems by 80 percent. Using KVM Remote Control and ISO mounts to solve a problem saves remote employees more than USD 100 on shipping alone and more than 10 hours of employee downtime, on average.
2 White Paper Intel vpro Technology: Proven Value in Four Use Cases Contents Executive Overview... 1 Background... 2 Analyzing Intel vpro Technology s Business Value... 2 Security Use Cases... 3 Support Use Cases... 4 Next Steps... 5 Conclusion... 5 For More Information... 6 Acronyms... 6 IT@Intel The IT@Intel program connects IT professionals around the world with their peers inside our organization sharing lessons learned, methods and strategies. Our goal is simple: Share Intel IT best practices that create business value and make IT a competitive advantage. Visit us today at or contact your local Intel representative if you d like to learn more. Background Intel s worldwide computing environment includes more than 100,000 PCs in 63 countries. More than 80 percent of these devices are mobile PCs that connect wirelessly to our network. At Intel, as at most companies, managing and securing these PCs especially for highly mobile employees is a key IT priority. During 2011, Intel IT finished enabling Intel vpro technology on all client PCs in use at Intel. Intel vpro technology increases our ability to maintain, manage, and protect PCs while reducing management costs. Our current environment consists of Intel Core i5 vpro and Intel Core i7 vpro processor-based systems with Intel Active Management Technology (Intel AMT), a component of Intel vpro technology. Over 80 percent of these systems use Intel AMT version 6 or above; the remaining systems use an earlier version of Intel AMT. Intel vpro technology is a hardware-based capability built into PCs that enables us to remotely perform many functions that previously required onsite support. We use this underlying capability to improve incident resolution and asset discovery, and to also increase enterprise security. Every PC, including desktops, laptops, notebooks, and business Ultrabook devices, in use at Intel is equipped with Intel vpro technology. Seventyfive thousand of these PCs have Intel AMT configured, and we are steadily increasing this number through ongoing PC refresh. To improve our ability to remotely manage our PCs and use certain features of Intel AMT, Intel IT partnered with Intel s Business Client Platform Division (BCPD) to test, evaluate, and suggest improvements to Intel Setup and Configuration Software (Intel SCS) to create a highly available, agile configuration and maintenance environment for our mobile systems. Intel SCS sets and defines the features of Intel AMT and governs how they behave on the client. Currently, our environment uses Intel SCS 8.1, and Intel IT and BCPD are collaborating to continually incorporate new features that benefit IT operations. Analyzing Intel vpro Technology s Business Value A key Intel vpro technology capability is out-of-band (OOB) manageability implemented through Intel AMT. Intel AMT s OOB capability, which operates from firmware and establishes a secure communication channel, enables remote control of client PCs without the use of client software, even in a pre-installation environment. This capability makes client management less susceptible to issues that affect the OS and allows remote access to the PC regardless of the system s power state or OS condition which is beneficial in many areas, such as information security, IT support, and ediscovery activities. We analyzed the return on investment (ROI) associated with four Intel vpro technology use cases currently deployed at Intel: Enterprise-scale solution for remote management of self-encrypting drives Remote passphrase reset Hardware-based Keyboard-Video- Mouse (KVM) Remote Control ISO mount In each use case, shown in Figure 1, we found that Intel vpro technology reduced management costs and employee downtime significantly. 2
3 Intel vpro Technology: Proven Value in Four Use Cases White Paper Security Support Enterprise-scale solution for remote management of self-encrypting drives Using Intel AMT to remotely access the BIOS creates an end-to-end solution to manage hardware-based whole-disk encryption Remote passphrase reset Out-of-band capabilities cut passphrase reset time by 80 percent Keyboard-Video-Mouse (KVM) Remote Control Ability to diagnose and repair PCs even when the OS is non-functional avoids shipping costs and decreases employee downtime ISO mounts using Integrated Drive Electronics Redirection (IDER) Service Desk technicians use IDER to remotely restore a crashed OS without a desk-side visit Figure 1. Deployment of use cases based on Intel vpro technology. Security Use Cases As the workforce continues to become more mobile, sensitive corporate data and intellectual property are increasingly at risk if the proper protections are not in place. As with most companies, information security is a high priority at Intel. We have identified two security-related use cases of Intel vpro technology that show significant ROI. These use cases take advantage of Intel AMT capabilities to remotely manage data security settings on self-encrypting drives and remotely unlock encrypted drives. ENTERPRISE-SCALE SOLUTION FOR REMOTE MANAGEMENT OF SELF-ENCRYPTING DRIVES To protect one of Intel s greatest assets intellectual property we require employees to use a whole-disk encryption (WDE) solution. We have deployed a hardwarebased WDE solution that addresses many of the operational and business challenges we have experienced with software-based WDE. The solution combines self-encrypting Intel Solid State Drives (Intel SSDs) with Intel AMT OOB capabilities, such as being able to remotely access the BIOS, to create an end-to-end enterprise-scale management solution for self-encrypting drives. As part of the solution, we developed a password management utility, manageability web services, and a secured database. 1 1 For more information on the hardware-based WDE solution, refer to the white paper, Managing Intel Solid- State Drives Using Intel vpro Technology, June Financial Methodology In our financial analysis of Intel vpro technology at Intel, we used an approach that differs from the typical method of comparing overall investment cost to all of the benefits gained. Determination of cost. Several years ago, we made the strategic decision to make mobile business PCs equipped with Intel vpro technology-based processors our plan-of-record system. This decision was based on the numerous benefits of such systems, including compatibility with emerging technologies and next-generation OSs, durability and reliability, a stable image, and resale price. With Intel vpro technology already a part of our PC fleet, it is difficult to identify a specific cost associated solely with Intel vpro technology because we do not attribute the price difference between consumer-class PCs and enterprise-class PCs specifically to Intel vpro technology, as others might. Also, at Intel we have built an infrastructure that meets our enterprise needs, such as information security and privacy, support for mobility and a wide variety of computing devices, and cost-efficient client maintenance and support. Intel vpro technology capabilities utilize this existing infrastructure with negligible incremental investment needed to support the use cases we are implementing further complicating the identification of the exact cost of Intel vpro technology. Determination of benefits. We found that benefits attributed to Intel vpro technology are heavily dependent on the context of the use case. At a high level there is a set of use cases that relates to providing remote support. Since Intel s robust support infrastructure provides physical hands-on technical support for more than 90 percent of employees on site, the productivity lost if they need technical support is moderate because a PC service center is not far away. However, for employees who are not located near a support center, Intel vpro technology s remote support capability dramatically reduces incident costs but does not have a significant impact on the support organizational budget due to economies of scale. In 3 out of the 4 use cases presented in this paper, since the benefits significantly increase once the employees do not have ready access to a PC service center, we anticipate that an enterprise that has a leaner support infrastructure or a higher percentage of remotely located employees would see greater benefits than what we ve described in this white paper. Due to the challenges in carving out the costs and benefits that directly relate to Intel vpro technology, we chose to articulate only the costs and benefits that directly relate to use cases presented. 3
4 White Paper Intel vpro Technology: Proven Value in Four Use Cases Self-Encrypting Intel Solid- State Drives (Intel SSDs) Self-encrypting drives (SEDs), such as the Intel SSD 320 Series and Intel SSD 520 Series, have a drive controller that automatically encrypts and decrypts all the drive s data as it s written and read. The disk encryption key is never present in the computer s processor or memory, where it could be accessed by hackers. The key used to encrypt and decrypt is securely stored only on the drive. Because the disk encryption key is encrypted with the Advanced Technology Attachment (ATA) passwords, the key is made accessible to the drive only after successful user authentication; without the key the data remains encrypted on the media. Authentication of the user is done within the SED by supplying the ATA user password, which is isolated from the OS. Therefore, any attacks on OS vulnerabilities cannot affect an SED s pre-boot process. SEDs offer the rugged reliability, responsive performance, better PC battery life, and flexibility and scalability of all Intel SSDs, with the added benefit of securing data. Their built-in encryption circuit alleviates the performance impact associated with a software-based whole disk encryption (WDE) solution. Both the Intel SSD 320 Series and the Intel SSD 520 Series use the Intel Advanced Encryption Standard New Instructions (Intel AES-NI) with 128-bit encryption, which is equal to the encryption strength of the majority of software-based WDE solutions and complies with the widely accepted FIPS 197 industry standard. Our approach to hardware-based WDE management provides benefits to end users, IT support personnel, and staff engaged in information security and ediscovery. The solution provides an increased ROI for Intel technologies already in use in our environment and reduction of our ongoing maintenance costs. We also do not have to purchase additional licenses for our software-based encryption solutions. At Intel, Intel SSDs are part of the default client configuration, 2 therefore we consider the WDE licensing and maintenance cost savings as net cost avoidance. REMOTE PASSPHRASE RESET The deployment of WDE solutions involves setting a passphrase. Our Service Desk technicians receive thousands of passphraserelated calls every year. Often one of the WDE software solutions we use can assist the users in resetting their passphrases themselves by answering security questions. However, in other cases, in incidents where Intel AMT in not present or enabled, a Service Desk technician uses the phone to guide employees through a fairly complicated task for resetting the passphrase. This process can be particularly difficult when language differences such as accents or dialects are present. To address passphrase-related calls, we developed a web-based application, called the Intel Generic Redirection Tool (Intel GRT), that uses a feature of Intel AMT. In these cases, Intel vpro technology automates the diagnostics process, so Service Desk technicians do not have to walk employees through the process over the phone. In our analysis, the use of Intel vpro technology for resetting passphrases reduces the time it takes to resolve a first-level support call ticket by 80 percent and the cost per ticket by 70 percent. Support Use Cases Remote Service Desk assistance is more time-efficient and cost-effective than deskside visits. Intel vpro technology enables Service Desk technicians to remotely support employees, providing additional value to employees who are not located near our Service Desk centers. Intel AMTenabled clients allow our Service Desk staff to take control of a remote PC quickly to troubleshoot and repair many hardware and software issues and use the Integrated Drive Electronics Redirection (IDER) feature to boot from an ISO image, perform OS installs, share a drive remotely, or access the Microsoft Windows* Preinstallation Environment. In our analysis, we found that on Intel campuses where employees do not have ready access to a PC service center, Intel vpro technology s support for KVM Remote Control and ISO mounts can save more than USD 100 on shipping alone and more than 10 hours of employee productivity per incident, on average. KEYBOARD-VIDEO-MOUSE (KVM) REMOTE CONTROL Unlike software-based KVM solutions, hardware-based KVM Remote Control is not limited to situations where the OS is working. Intel Core vpro processors with KVM Remote Control enable Service Desk technicians to diagnose and repair PCs even when the OS is non-functional a situation that accounts for a significant number of Service Desk calls. For example, our Service Desk technicians received about 4,000 boot issue-related calls in the second half of KVM Remote Control enables them to resolve such problems without a costly desk-side visit or sending the employee s PC to a Service Desk center. 2 See Accelerating Deployment of Intel SSDs throughout the Enterprise, October
5 Intel vpro Technology: Proven Value in Four Use Cases White Paper Here are two examples of recent Service Desk calls aided by Intel vpro technology: An employee with a corrupted profile was not able to log in to the OS from home. Using Intel AMT and KVM Remote Control, the Service Desk technician was able to log in with administrator privileges despite the employee s corrupted profile. The problem was resolved remotely in 30 minutes, preventing the employee from having to spend an entire day traveling with the affected PC to have it fixed. An employee contacted the Service Desk because she forgot her disk encryption password but did not know what sort of encryption her system used (softwarebased or hardware-based). The Service Desk technician used KVM Remote Control to connect to the system and, on discovering the splash screen for a self-encrypted solidstate drive, was able to help the employee change her encryption password. ISO MOUNT Employees often encounter boot-time problems. Intel vpro technology provides our Service Desk technicians with the ability to boot a crashed system remotely using an image file located either on a network drive or on the technician s PC. This ability, combined with KVM Remote Control, enables Service Desk technicians to restore a machine s functionality without a desk-side visit or the employee having to bring the PC to a Service Desk center. For example, an employee experienced a boot failure related to disk encryption. Using KVM Remote Control combined with an ISO mount, a Service Desk technician was able to repair the affected PC in about 30 minutes. The employee was located in an office with no onsite support; using the phone to guide the employee through the process of building a boot CD using a colleague s PC would have taken much longer. We estimate that we saved at least one hour of downtime and a lot of frustration for this employee. Next Steps We are currently working to implement several additional capabilities based on Intel vpro technology. One of these capabilities is client-initiated remote access (CIRA), often referred to as Fast Call For Help (FCFH). 3 FCFH will allow the use of KVM Remote Control and other Intel vpro technology capabilities outside the firewall, over the Internet. FCFH supports our overarching goal of increased IT support for our highly mobile workforce. The FCFH feature of Intel AMT allows Intel vpro technology-based platforms to initiate a secure connection to a gateway server residing in the enterprise demilitarized zone. Using FCFH, the IT administrator can remotely manage Intel vpro technologybased clients when the client system is located outside the corporate network. We plan to begin using FCFH at Intel in 2013, and are currently working on three FCFH use cases. We anticipate these use cases will expand the ROI potential for Intel vpro technology across the enterprise. Conclusion Intel vpro technology s OOB manageability, implemented through Intel AMT, helps us increase our ability to maintain, manage, and protect PCs while decreasing management costs. Several use cases deployed at Intel illustrate the business value of Intel vpro technology: Enterprise-scale solution for remote management of self-encrypting drives. The ability to use Intel AMT to remotely access the BIOS enables us to create an 3 Fast Call For Help (FCFH) is a feature of Intel AMT that allows Intel vpro technology platforms to initiate a secured connection to a gateway server residing in the enterprise demilitarized zone (DMZ). For more information, refer to end-to-end solution to manage hardwarebased WDE. Remote passphrase reset. Service Desk technicians can view the PC remotely OOB, including on-screen error messages. This allows Service Desk technicians to repair systems directly rather than talking employees through a diagnostic process over the phone. KVM Remote Control. Service Desk technicians can use hardware-based KVM Remote Control to diagnose and repair PCs even when the OS is non-functional. ISO mounts. Service Desk technicians can use IDER to boot from an ISO image, perform OS installs, share a drive remotely, or access the Microsoft Windows Preinstallation Environment. Intel vpro technology reduces the time it takes to resolve passphrase reset problems by 80 percent. Remote management of selfencrypting drives uses Intel AMT to remotely access the BIOS to create an end-to-end solution to manage hardware-based WDE. In the KVM Remote Control and ISO mount use cases, Intel vpro technology saves remote employees more than USD 100 on shipping alone and more than 10 hours of employee downtime, on average. We anticipate achieving even more savings and efficiency through the use of Intel vpro technology in additional use cases in the near future. 5
6 For More Information To get help with Intel vpro technology implementation, visit content/www/us/en/remote-support/ implementation-of-intel-vpro-technology. html?cid=sem116p15966 Visit to find white papers on related topics: Configuration Tips for Managing Mobile PCs with Intel vpro Technology Managing Intel Solid-State Drives Using Intel vpro Technology Achieving Long-term Business Value with Intel vpro Technology Evaluating Keyboard-Video-Mouse (KVM) Remote Control Enterprise-wide Deployment of Notebook PCs with Solid-State Drives Intel vpro Technology: From Provisioning to Use Case Implementation New Security Solutions Using Intel vpro Technology Acronyms CIRA client-initiated remote access FCFH Fast Call For Help IDER Integrated Drive Electronics Redirection BCPD Business Client Platform Division Intel AMT Intel Active Management Technology Intel AES-NI Intel Advanced Encryption Standard New Instructions Intel SCS KVM OOB ROI SED Intel SSD WDE Intel Setup and Configuration Software Keyboard-Video-Mouse out-of-band return on investment self-encrypting drive Intel Solid-State Drive whole-disk encryption For more information on Intel IT best practices, visit This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Intel, the Intel logo, Core, vpro, and Ultrabook are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Copyright 2013 Intel Corporation. All rights reserved. Printed in USA Please Recycle 0313/JGLU/KC/PDF US
IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now
IT Boosting Employee & Business Productivity with Innovative Technologies and Solutions Refresh Now Lawson Lu Site Manager Vietnam August 20, 2013 Legal Notices This presentation is for informational purposes
More informationLenovo ThinkCentre M90z with Intel vpro Technology. Stefan Richards Intel Corporation Business Client Platform Division
Lenovo ThinkCentre M90z with Intel vpro Technology Stefan Richards Intel Corporation Business Client Platform Division stefan.n.richards@intel.com 1 Legal Information 1. INFORMATION IN THIS DOCUMENT IS
More informationIntel Core vpro Processors Common-Use Guide
Intel Core vpro Processors Common-Use Guide For LabTech Software* (Revision 1.1 December 6, 2011) Table of Contents Introduction... 3 Setup and Assumptions... 3 Common Use Cases Covered in this Guide...
More informationSolution Recipe: Increase Data Protection Using Intel vpro Technology
Solution Recipe: Increase Data Protection Using Intel vpro Technology Preface Intel has developed a series of unique Solution Recipes designed for channel members interested in providing complete solutions
More informationDeveloping an Enterprise Client Virtualization Strategy
White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the
More informationIntel and Symantec: Improving performance, security, manageability and data protection
Intel and Symantec: Improving performance, security, manageability and data protection Terry Cutler Enterprise Solution Architect Omid Meshkin Strategic Business Development 1 Session Objectives By the
More informationManagement and Printing User Guide
Management and Printing User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U. S. registered trademark of Microsoft Corporation. Intel and Centrino are trademarks or registered
More informationIntel Manageability Commander User Guide
Intel Manageability Commander User Guide Document Release Date: October 27, 2016 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
More informationThe Intel SSD Pro 2500 Series Guide for Microsoft edrive* Activation
The Intel SSD Pro 2500 Series Guide for Microsoft edrive* Activation Solutions Blueprint January 2015 Order Number: 330880-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationIncreasing Data Center Efficiency through Metering and Monitoring Power Usage
White Paper Intel Information Technology Computer Manufacturing Data Center Efficiency Increasing Data Center Efficiency through Metering and Monitoring Power Usage To increase data center energy efficiency
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationVendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo
Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.
More informationIntel vpro Technology
Intel vpro Technology Common-Use Guide For Level Platforms Managed Workplace* 2012 White Paper Intel vpro Technology Level Platforms Managed Workplace* 2012 Introduction Common Uses for Level Platforms
More informationDesktop DNA r11.1. PC DNA Management Challenges
Data Sheet Unicenter Desktop DNA r11.1 Unicenter Desktop DNA is a scalable migration solution for the management, movement and maintenance of a PC s DNA (including user settings, preferences and data).
More informationWhite paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth
White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto
More informationThe Time Is Now. for Platform Refresh
The Time Is Now for Platform Refresh The synchronized release of Windows 10 Enterprise and 6th gen Intel Core vpro processors offers a huge opportunity for a better together refresh strategy. There s Never
More informationRoving Reporter: Ringing Up POS System Sales with Intel vpro Technology
Roving Reporter: Ringing Up POS System Sales with Intel vpro Technology By Mark Scantlebury The market for point-of-sale (POS) machines is extremely competitive, but POS machine designers can get an edge
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationIntel vpro Technology Virtual Seminar 2010
Intel Software Network Connecting Developers. Building Community. Intel vpro Technology Virtual Seminar 2010 Getting to know Intel Active Management Technology 6.0 Remote Encryption Management Andy Schiestl
More informationHow to Create, Deploy, & Operate Secure IoT Applications
How to Create, Deploy, & Operate Secure IoT Applications TELIT WHITEPAPER INTRODUCTION As IoT deployments accelerate, an area of growing concern is security. The likelihood of billions of additional connections
More informationChallenges and. Opportunities. MSPs are Facing in Security
Challenges and Opportunities MSPs are Facing in 2017 Security MSPs work in an environment that is constantly changing for both the needs of customers and the technology in which they provide. Fanning the
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationIntel Cache Acceleration Software - Workstation
Intel Cache Acceleration Software - Workstation Version 2.7.0 Order Number: x-009 Contents INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
More informationREMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS
REMOTE IT MANAGEMENT SOLUTIONS: MANAGE REMOTE OFFICES WITHOUT LEAVING YOURS IT Challenges AT THE REMOTE OFFICE Compared to data centers, remote offices and facilities pose unique hardware and IT management
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationManaging the Microsoft Windows* Transition in Your Enterprise. October 2013
Managing the Microsoft Windows* Transition in Your Enterprise October 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationMcAfee epo Deep Command
Quick Start Guide McAfee epo Deep Command version 2.4.1 This Quick Start Guide provides high level instructions for setting up McAfee epo Deep Command 2.4.1. For detailed instructions, refer to the McAfee
More informationEmbedded and Communications Group January 2010
Return to Growth Driving a Smarter, More Connected World Embedded and Communications Group January 2010 The News NRF: Intel Unveils Digital Signage Proof of Concept Interactive, 7.6 x10 digital signage
More informationIntel Cache Acceleration Software for Windows* Workstation
Intel Cache Acceleration Software for Windows* Workstation Release 3.1 Release Notes July 8, 2016 Revision 1.3 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS
More informationImproving the Mobile Experience with Solid-State Drives. White Paper Intel Information Technology Computer Manufacturing Mobile Computing
White Paper Intel Information Technology Computer Manufacturing Mobile Computing Improving the Mobile Experience with Solid-State Drives Intel IT is evaluating solid-state drive (SSD) technology to better
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More information2008 Intel Core 2 Processor with vpro Technology Launch Keynote
2008 Intel Core 2 Processor with vpro Technology Launch Keynote Gregory Bryant Vice President Digital Office Platform Division September 22, 2008 Legal and Trademark Disclaimers 1. Performance based upon
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationMobile Data Security Essentials for Your Changing, Growing Workforce
Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity
More informationMicrosoft SQL Server on Stratus ftserver Systems
W H I T E P A P E R Microsoft SQL Server on Stratus ftserver Systems Security, scalability and reliability at its best Uptime that approaches six nines Significant cost savings for your business Only from
More informationCisco Unified Computing System Delivering on Cisco's Unified Computing Vision
Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision At-A-Glance Unified Computing Realized Today, IT organizations assemble their data center environments from individual components.
More informationChoosing the Right Deduplication Solution for Your Organization
Choosing the Right Deduplication Solution for Your Organization Application-based deduplication versus appliance-based deduplication Introduction Due to the significant data growth and extended retention
More informationOperating the Cloud to Deliver Business Value. Dr Liam Keating IT Director, Intel APAC
Operating the Cloud to Deliver Business Value Dr Liam Keating IT Director, Intel APAC Benefits of Cloud Fact or Fiction? For a few years now, everything we ve heard about cloud has mostly been hype. It
More informationAutomating VPN Management
Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationHOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business.
HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER Six key features to consider when choosing a mission-critical messaging partner for your business. MESSAGING MEANS BUSINESS Text messaging (or SMS) is a
More information1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE
1.0 Quest Enterprise Reporter Discovery Manager USER GUIDE 2012 Quest Software. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationPhishing is Yesterday s News Get Ready for Pharming
April 2005 Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust
More informationConnectware Manager Getting Started Guide
Connectware Manager Getting Started Guide 90000699_B 2004, 2005 Digi International Inc. Digi, Digi International, the Digi logo, the Digi Connectware log, the Making Device Networking Easy logo, Digi
More informationIntel Platform Administration Technology Quick Start Guide
Intel Platform Administration Technology Quick Start Guide 320014-003US This document explains how to get started with core features of Intel Platform Administration Technology (Intel PAT). After reading
More informationConfiguring and Using AMT on TS130. Lenovo ThinkServer
Lenovo ThinkServer August 31, 2011 Contents Overview... 3 Enabling and Configuring AMT on TS130... 3 Provisioning AMT on TS130 Using Manual Configuration Method... 4 AMT Configuration with Web Interface...
More informationIntel Entry Storage System SS4000-E
Intel Entry Storage System SS4000-E Software Release Notes January 2007 Storage Systems Technical Marketing Engineering Document Revision History Intel Entry Storage System SS4000-E Document Revision History
More informationSWsoft ADVANCED VIRTUALIZATION AND WORKLOAD MANAGEMENT ON ITANIUM 2-BASED SERVERS
SWsoft ADVANCED VIRTUALIZATION AND WORKLOAD MANAGEMENT ON ITANIUM 2-BASED SERVERS Abstract Virtualization and workload management are essential technologies for maximizing scalability, availability and
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationAvast Customer & Technical Support Policy
Avast Customer & Technical Support Policy PLEASE READ THE TERMS AND CONDITIONS OF THIS SUPPORT POLICY ( SUPPORT POLICY ). THIS SUPPORT POLICY IS PROVIDED BY AVAST SOFTWARE s.r.o., A COMPANY DULY ORGANIZED
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationWhite Paper. How to Write an MSSP RFP
White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationSecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success
SecureDoc: Making BitLocker simple, smart and secure for you Your guide to encryption success 1 It s time to unlock unbelievable new BitLocker advantages There is an encryption management solution out
More informationOptimize Your Databases Using Foglight for Oracle s Performance Investigator
Optimize Your Databases Using Foglight for Oracle s Performance Investigator Solve performance issues faster with deep SQL workload visibility and lock analytics Abstract Get all the information you need
More informationIntel Server Board S2600CW2S
Redhat* Testing Services Enterprise Platforms and Services Division Intel Server Board S2600CW2S Server Test Submission (STS) Report For Redhat* Certification Rev 1.0 This report describes the Intel Server
More informationMerging Enterprise Applications with Docker* Container Technology
Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationProSupport Suite. Shift from maintenance to innovation. for PCs and tablets. Dell ProSupport Suite for PCs and tablets 1
ProSupport Suite for PCs and tablets Shift from maintenance to innovation Dell ProSupport Suite for PCs and tablets 1 Complete support for evolving businesses Keeping PCs and tablets up and running is
More informationIntel Solid State Drive Firmware Update Tool
Intel Solid State Drive Firmware Update Tool Software Version 3.0.0 or later Document Number: 322570-011US Intel disclaims all express and implied warranties, including without limitation, the implied
More informationCisco Director Class SAN Planning and Design Service
Cisco Director Class SAN Planning and Design Service Rapidly Plan and Deploy a Cisco Director Class MDS Solution for More Efficient Storage Networking Service Overview Cisco s intelligent storage networking
More informationQuickSpecs Insight Manager 7 Service Pack 2
Overview Product Description Insight Manager 7, the core of the ProLiant Essentials Foundation Pack, maximizes system uptime, reduces total cost of ownership, and provides powerful monitoring and control
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationEnhance your Cloud Security with AMD EPYC Hardware Memory Encryption
Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital
More information50 % fewer steps to resolution
A Principled Technologies report: Hands-on testing. Real-world results. Get ahead of the problem by choosing Dell Premium Support Plus with SupportAssist technology The proactive service plan saved time
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationAltiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide
Altiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide Altiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide The software described in this book
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationStellar performance for a virtualized world
IBM Systems and Technology IBM System Storage Stellar performance for a virtualized world IBM storage systems leverage VMware technology 2 Stellar performance for a virtualized world Highlights Leverages
More informationNetworking for a smarter data center: Getting it right
IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting
More information5 Reasons for IT to Get Physical with Access Control
5 Reasons for IT to Get Physical with Access Control White Paper A guide to choosing an IT and user-friendly building security system Network security and building security are equally important. If either
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationIntel RealSense Depth Module D400 Series Software Calibration Tool
Intel RealSense Depth Module D400 Series Software Calibration Tool Release Notes January 29, 2018 Version 2.5.2.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
More informationSOLUTIONS TO CUSTOMER PAIN POINTS AND PAIN POINTS. Analyze and visualize data up to 40 percent faster 1. Speed to insight with faster data analytics
ThinkPad T480 The latest T-series business laptop is robust yet light enough to accompany busy professionals everywhere. Practical touches include an optional backlit keyboard and an array of ports, including
More informationDrive Recovery Panel
Drive Recovery Panel Don Verner Senior Application Engineer David Blunden Channel Application Engineering Mgr. Intel Corporation 1 Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationManaging Exchange Migration with Enterprise Vault
WHITE PAPER Managing Exchange Migration with Enterprise Abstract: Many organizations today are considering either replacing their legacy mail system, for example GroupWise or ccmail, with Microsoft Exchange
More informationBusinesses. Need Business PCS. PCs with Intel processors offer features that boost productivity and enable cost savings.
Businesses Need Business PCS PCs with Intel processors offer features that boost productivity and enable cost savings. 2 Do Consumer PCs Really Save Money? To help cut costs, businesses have begun using
More informationIntel Small Business Extended Access. Deployment Guide
Intel Small Business Extended Access Deployment Legal Notices and Disclaimers Disclaimers INTEL CORPORATION MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE
More information34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring
WHITEPAPER DOING MORE WITH LESS How shrinks total cost of ownership (TCO) compared to Windows I n a study measuring the TCO of Windows and servers, Red Hat Enterprise platforms exhibited 34% lower annual
More informationReaping the Benefits of Managed Services
Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective
More informationThe New USB-C Standard and How to Select a Matching Docking Station
The New USB-C Standard and How to Select a Matching Docking Station WHITE PAPER What is USB-C? USB-C, the latest USB standard, is attracting attention from all over the technology industry, as it carries
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationDRAM and Storage-Class Memory (SCM) Overview
Page 1 of 7 DRAM and Storage-Class Memory (SCM) Overview Introduction/Motivation Looking forward, volatile and non-volatile memory will play a much greater role in future infrastructure solutions. Figure
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationWHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY
WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationIntel vpro Technology Virtual Seminar 2010
Intel Software Network Connecting Developers. Building Community. Intel vpro Technology Virtual Seminar 2010 Getting to know Intel Active Management Technology 6.0 Fast and Free Software Assessment Tools
More informationAn Oracle White Paper October Minimizing Planned Downtime of SAP Systems with the Virtualization Technologies in Oracle Solaris 10
An Oracle White Paper October 2010 Minimizing Planned Downtime of SAP Systems with the Virtualization Technologies in Oracle Solaris 10 Introduction When business-critical systems are down for a variety
More informationChoosing the Right Solution for Strategic Deployment of Encryption
Choosing the Right Solution for Strategic Deployment of Email Encryption White Paper: Enterprise Email Encryption Email Protection Buyer s Guide Choosing the Right Solution for Strategic Deployment of
More informationDEPLOYMENT WHITE PAPER.
DEPLOYMENT WHITE PAPER www.seavusprojectviewer.com Deployment Options Seavus Project Viewer provides a wide variety of deployment options: Single User installation is a stand-alone, web downloadable configuration
More informationGoToMyPC Corporate Product Guide
GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center
More informationIntel Active Management Technology Overview
Chapter 5 Intel Active Management Technology Overview Management is doing things right; leadership is doing the right things. Peter Drucker (1909 2005) As we discussed in the last chapter, Intel Active
More informationAuthentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide
Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More information