PCs powered by the new 2010 Intel® Core™ vPro™ processor family adapt to the needs of your business with smart security, cost-saving manageability, and intelligent performance. The Intel Core vPro processor family is designed to keep downtime and desk-side visits to a minimum, enabling remote monitoring, diagnosis, and repair of PCs—even if they are shut down or the OS is unresponsive.¹
Intelligent security and manageability on every chip
Offering expanded remote manageability, select laptop and desktop PCs—powered by the Intel Core vPro processor family—provide new KVM Remote Control capabilities² along with enhanced data and asset security. Including programmable defense filters that systematically guard against viruses and malicious attacks, the Intel Core vPro processor family helps to automatically protect PCs from tampering or disabling of security software.
Product information
Performance benchmarks
Product brief
File Type/Size: PDF 365KB
Learn about processor numbersΔ
Features and benefits
Laptop and desktop PCs powered by the Intel Core vPro processor family delivers cost-cutting efficiency and maximum productivity with the intelligence of hardware-assisted Intel® technologies built in:
Performance
Intel® Turbo Boost Technology maximizes speed for demanding applications, dynamically accelerating performance to match your workload—more performance when you need it the most and energy savings when you do not.³
Intel® Hyper-Threading Technology (Intel® HT Technology) enables highly threaded applications to get more work done in parallel. With eight threads available to the operating system, multi-tasking becomes even easier.4
Intel® HD Graphics provides superb visual performance for sharper images and richer color.
Security and manageability
KVM Remote Control allows IT to see what their customers see, reliably through all states, even beyond firewalls.²
AES-NI enables new processor instructions to accelerate and protect encryption operations.
Remote encryption management provides the capability to remotely unlock encrypted drives that require pre-boot authentication while managing data security settings even when the PC is off.
Intel® Anti-Theft Technology, disables access to data in the event of theft or loss by delivering a "poison pill" while providing simple remote reactivation on PC recovery.
Intel® Active Management Technology (Intel® AMT)¹ allows IT to better discover, heal, and protect their networked computing assets.
Intel® Virtualization Technology (Intel® VT) allows IT to remotely manage systems while providing highly secure, centralized, and virtualized IT services to end users.5
Streamline Windows 7* deployment by quickly and remotely upgrading PCs overnight, minimizing disruptions to users, and without losing access to legacy applications.
Intel® Centrino® Ultimate-N 6300 offers premium performance and innovative features with up to an 8x bandwidth.6
Activate Intel® vPro™ technology for immediate cost savings and recoup your investment in as little as ten months°
IT Center
Discover solutions for IT with Intel® vPro™ technology
Learn more
Compare products
Compare motherboards and barebones
Compare desktop chipset components
¹ Intel® Active Management Technology (Intel® AMT) requires the computer system to have an Intel® AMT-enabled chipset, network hardware and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the purchaser and may require scripting with the management console or further integration into existing security frameworks to enable certain functionality. It may also require modifications of implementation of new business processes. With regard to notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see http://www.intel.com/technology/platform-technology/intel-amt/index.htm.
² KVM (keyboard, video, mouse) Remote Control requires the presence of integrated graphics and therefore is only available with dual-core Intel® Core™ i5 vPro™ processors and Intel® Core™ i7 vPro™ processors.
³ Intel® Turbo Boost Technology requires a PC with a processor with Intel Turbo Boost Technology capability. Intel Turbo Boost Technology performance varies depending on hardware, software, and overall system configuration. Check with your PC manufacturer on whether your system delivers Intel Turbo Boost Technology. See http://www.intel.com/technology/turboboost/index.htm for more information.
4 Intel® Hyper-Threading Technology (Intel® HT Technology) requires a computer system with a processor supporting Intel® HT Technology and an Intel® HT Technology-enabled chipset, BIOS, and operating system. Performance will vary depending on the specific hardware and software you use. Intel® Hyper-Threading Technology is not available on the Intel® Core™ i5-750 processor. For more information including details on which processors support Intel® HT Technology, see http://www.intel.com/technology/platform-technology/hyper-threading/index.htm.
5 Intel® Virtualization Technology (Intel® VT), Intel® Trusted Execution Technology (Intel® TXT), and Intel® 64 architecture require a computer system with a processor, chipset, BIOS, enabling software and/or operating system, device drivers and applications designed for these features. Performance will vary depending on your configuration. Contact your vendor for more information.
6 Up to 8X bandwidth increase based on the theoretical maximum bandwidth enabled by 3x3 Draft-N implementations with three spatial streams in combination with a three spatial stream access point. Actual wireless throughput and/or range will vary depending on your specific operating system, hardware and software configurations. Check with your PC manufacturer for details.
Δ Intel® processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. Based on a Model Company developed by Wipro Technologies in a March 2009 study titled "Using Total Cost of Ownership to Determine Optimal PC Refresh Lifecycles." Actual results may vary based on the number of use cases implemented and may not be representative of the results that individual businesses may realize.
0 comments:
Post a Comment