2nd Generation Intel® Core™ Processors Bring New Security Features to Protect Data and Identities
- Intel Core™ vPro™ processor-based PCs provide the performance and capabilities to reshape business computing to address desktop virtualization, client-aware cloud computing and the PC's complementary relationship with the growing variety of other computing devices.
- A 2nd generation Intel® Core™ vPro™ i5 processor can speed up business applications by 60 percent, multitasking by 100 percent and data encryption 300 percent.
- Intel has further simplified IT's job by completely automating Intel vPro Technology set-up and by enhancing the capabilities of Intel ® Keyboard-Video-Mouse Remote Control.
- ntel® Anti-Theft Technology Ver. 3.0 protects data on missing PCs with 3G "poison pill" and GPS, while new Intel® Identity Protection Technology helps protect against identity theft.
SANTA CLARA, Calif., Mar. 7, 2011 – Bringing industry leading security and manageability, and better, more flexible performance to business computing, Intel Corporation today unveiled its newest family of business processors. The new 2nd generation Intel® Core™ vPro™ processor family features the performance and capabilities of Intel's new microarchitecture, enhancements to Intel® vPro™ technology and new security features, including a 3G "poison pill" option to help protect a PC's data.
Computer makers around the world, including Dell, Fujitsu, HP and Lenovo, are introducing new laptop, convertible-tablet, desktop and all-in-one PCs for businesses based on the new Intel Core vPro processors.
"Businesses face numerous challenges today, but also opportunities in the wealth of new technologies that are helping workers be more productive, businesses to be more creative and IT to be more innovative," said Rick Echevarria, vice president, Intel Architecture Group, and general manager, Business Client Platform Division. "Providing the right combination of technologies at the right time, the new Intel Core vPro processor family continues Intel's advancement in performance, security and management. Possibly more critical, it readies businesses for major changes to come in such areas as desktop virtualization, cloud computing and the complementary relationship between PCs and the growing variety of other computing devices."
To take full advantage of emerging innovation, the new Core vPro processors offer the increased performance of Intel's new microarchitecture, enhanced Intel® Turbo Boost Technology 2.0 and new Intel® Advanced Vector Extensions (AVX). Compared to a 3-year-old Intel® Core™ 2 Duo processor, a new Intel® Core™ vPro™ i5 processor speeds up business applications by 60 percent, multitasking by 100 percent and data encryption by 300 percent.1
"This kind performance equates to enormous promise for the PC, for example, as the 'hub' for the varied combination of tablets, smart phones, netbooks and operating systems filling our pockets and briefcases," said Echevarria. "The new Core vPro processor family has the capacity to offload tasks or even better share them to get the most from companion devices. With such performance, the PC could be a service provider, coordinating encryption, virus scanning, near transparent syncs and remote control."
Protecting Data on Missing Laptops
To provide stronger defense against the problem of laptop theft and data loss, Intel today introduced Intel® Anti-Theft Technology Ver. 3.0 (AT 3.0), included on all 2nd generation Intel Core and Core vPro processors.
Previous versions of Intel Anti-Theft Technology enabled authorized IT or service personnel to send a coded "poison pill" over the Internet to completely disable a lost or stolen computer and help prevent access to its encrypted data and deter theft. New Intel AT 3.0 enables the poison pill to be sent as an encrypted, authenticated SMS message by an authorized administrator over a 3G cellular network as well within moments after a missing laptop is turned on. When recovered, the PC can be similarly re-activated with another message. Its new Locator Beacon capability gives authorities the ability to pinpoint a missing laptop using GPS technology on select 3G modems.
Finally, the new Intel AT 3.0 standby protection feature helps protect encrypted PCs that go missing in the vulnerable standby state (S3). When awakened, the new standby protection feature can change normal procedure to require an encryption login, which is much more secure than the usual username and password.
Drying Up the Ol' Phishing Hole
New Intel® Identity Protection Technology (IPT), which is integrated into select 2nd generation Intel Core and Core vPro processors, helps stymie phishing attacks aimed at gaining unlawful access to corporate, e-banking, e-commerce and other secure sites. IPT supplements normal password procedures by generating a new six-digit numerical password every 30 seconds to help ensure only authorized access.
Making IT Simpler
The 2nd generation Intel Core vPro processors also help make IT simpler with the new Host-Based Configuration feature that completely automates the process of setting up the vPro functions on new computers. Now even thousands of computers can be configured simultaneously in a couple of minutes.
Intel's Keyboard-Video-Mouse (KVM) Remote Control feature now enables a remote technician to see the worker's screen presentation in higher resolutions to accommodate HD video and screen sizes.
Visually Smart Performance for the New Office
When a workload requires extra performance, the enhanced Intel® Turbo Boost Technology 2.0 steps up processor speeds beyond their rated frequency by analyzing temperature and power consumption. New Intel AVX improves the performance of computing-intensive applications, such as image manipulation, audio/video processing, scientific simulations, financial analytics, and 3-D modeling and analysis.
To meet the growing dominance of video as the potential heir to traditional white papers, product briefs and slide presentations, the new processor family integrates Intel® HD Graphics and advanced media processing into its entire line, eliminating the need for separate graphical processing units for performance-intensive graphical applications.
Also the Intel® Quick Sync Video feature doubles the speed of creating DVDs or Blu-ray* discs, editing and converting video files into other formats over the preceding generation of Intel Core vPro processors.
Intel vPro Technology Expands Into New Realms
The soon-to-be-released Intel® Xeon® processor E3-1200 product family will bring all of the advances of Intel's new microarchitecture to entry-level workstations. It is the first entry-level workstation platform to integrate professional-level graphics onto the processor, enabling visual and 3-D graphics capabilities previously only available with separate graphics cards. Intel is also extending support for Intel® vPro™ technology to these workstations.
In addition to workstations and servers, Intel® vPro Technology also can be found in a variety of innovative applications beyond PCs, such as retail, digital signage and banking devices. With features such as Intel® Active Management Technology 7.0 built-in, 2nd generation Intel Core vPro i5 and i7, and Intel® Xeon® E3 processors, embedded customers are able to manage multiple devices from a single host station, which enables them to troubleshoot problems real-time and effectively lower costs for manual checks.
View the Multimedia Press Kit
(includes high resolution photos, videos, demos, fact sheets, and more)
Intel (NASDAQ: INTC) is a world leader in computing innovation. The company designs and builds the essential technologies that serve as the foundation for the world’s computing devices. Additional information about Intel is available at newsroom.intel.com and blogs.intel.com.
Intel, Core, vPro, Xeon and the Intel logo are trademarks of Intel Corporation in the United States and other countries.
* Other names and brands may be claimed as the property of others.
1 Comparing Intel® Core™ i5-2520M processor based laptops to theoretical installed base of Intel® Core™2 Duo Processor T7250. Business productivity claims based on SYSmark* 2007. Multitasking claims based on PCMark Vantage. Security workload consists of SiSoftware Sandra* 2010 - AES256 CPU Cryptographic subtest measures CPU performance while executing Advanced Encryption Standard encryption and decryption algorithm. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors.