1 / 0

Usage Notes

Usage Notes. Revision date : Feb 2011

mervyn
Télécharger la présentation

Usage Notes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Usage Notes Revision date: Feb2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions to small businesses. This material is focused on small business operational issues, and provides proof points based on industry research and Intel benchmarks. All messaging is approved for a non-NDA audience; however, this content is not intended for distribution directlyto end-users in marketing or presentation materials. Usage guidance: Read and remove this slide BEFORE utilizing materials. Do not delete the legal information footnotes from the slides. This content is also available in an animated GIF format on SMCR for use on Intel websites as banners to drive resellers to additional sales training materials. Shelf life: January 2011 thru June 30, 2011. New products or information introduced during this period may result in an update to this document. Remove This Slide Before Using
  2. Visibly Smart. Small Business Technology Tips of the Week: Security
  3. Don’t Let Your Small Business Customers Lose Money Reliable Solutions. 46% of businesses that lose data, lose revenue.1 Reduce data loss with solutions that have security built-in. Learn more with “Selling Security Solutions to Small Business” Symantec, 2010 SMB Information Protection Survey , http://www.symantec.com/content/en/us/about/media/pdfs/SMB_ProtectionSurvey_2010.pdf?om_ext_cid=biz_socmed_twitter_2010Jun_worldwide_SMB
  4. 50% of Small Businesses Have Experienced Data Loss Within the Last Year1 Encrypt Data. Reduce Risk. Help your customers reduce risk with 2nd generation Intel® Core™ i5 processor-based PCs that encrypt data faster, thanks to built-in Intel® AES-NI Instructions2. Learn more with “Selling Security Solutions to Small Business” 1Source: Rubicon Consulting, 2009, US based survey 2 Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence.  AES-NI is available select on Intel® Core™ processors.  For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/
  5. On Average, Small Businesses Experience Three Technology Disruptions a Year1 Remote Repair. Reduced Downtime. Help keep your customers’ operations running smoothly with 2nd generation Intel® Core™ i5 vPro™ processor-based PCs with KVM Remote Control2 built in. Learn more with “Selling Security Solutions to Small Business” 1Source: SMB Disaster Preparedness Survey, Symantec, Q3 2009 http://www.symantec.com 2. KVM Remote Control (Keyboard Video Mouse) is only available with Intel® Core™ i5 vPro™ processors and i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported
  6. A Laptop is Stolen Every 53 Seconds1 Protect Company Data Minimize the risk of laptop theft or loss with laptops built with 2nd generation Intel® Core™ processors and enabled with Intel® Anti-Theft Technology2 Learn more “Selling Security Solutions to Small Business” 1“Notebook Total Cost of Ownership: 2008 Update,” Gartner, February 2008 (www.Gartner.com) 2. No system can provide absolute security under all conditions.  Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider.  Consult your system manufacturer and Service Provider for availability and functionality.  Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof.  For more information, visit http://www.intel.com/go/anti-theft
  7. Your Customers Can Have Data Protection Without Impacting Performance Visibly Smart Performance PCs built with 2nd generation Intel® Core™ i5 processors encrypt sensitive data up to 4X faster1 with built-in Intel® AES-NI.2 Help keep customer information safer and employees more productive. 1Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Cross client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurationns: Mobile: pre-production Intel® Core™ i5-2520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T7250. Desktop: pre-production Intel® Core™ i5-2400 processor based desktops to theoretical installed base of Intel® Core™2 Duo Processor E6550 with comparable frequency. For more information go to http://www.intel.com/performance  2. Intel ® AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni Learn more with “Selling Security Solutions to Small Business”
More Related