• <Intel.com에 대한 자세한 내용

Intel® Core™ vPro™ Processor Legal Disclaimers

Intel® Core™ vPro™ Processor Legal Disclaimers

 

Security Claim: Intel® Trusted Execution Technology

No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/go/inteltxt.

 

Intel® Turbo Boost Technology

Requires a system with Intel® Turbo Boost Technology capability. Intel Turbo Boost Technology 2.0 is the next generation of Turbo Boost Technology and is only available on select Intel® processors. Consult your PC manufacturer. Performance varies depending on hardware, software, and system configuration. For more information, visit http://www.intel.com/go/turbo.

 

Intel® vPro™ Technology

Intel® vPro™ Technology is sophisticated and requires setup and configuration. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environment. To learn more about the breadth of security features, visit http://www.intel.com/technology/vpro.

 

Intel® Hyper-Threading Technology

Requires an Intel® Hyper-Threading Technology-enabled system, consult with your PC manufacturer. Performance will vary depending on the specific hardware and software used. Not available on all Intel® processors. For more information, including details on which processors support Intel HT Technology, visit http://www.intel.com/go/ht.

 

Security Claim: Built-in Security

No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® Core™ processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your PC manufacturer for more details. For more information visit www.intel.com/technology/security.

 

Security Claim: Intel® Virtualization Technology

Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance, or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/content/www/us/en/virtualization/virtualization-technology/hardware-assistvirtualization-technology.html.

 

Security Claim: Intel® Identity Protection Technology

No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd or 3rd gen Intel® Core™ processor, enabled chipset, firmware, and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/identityprotection/identity-protection-technology-general.html.

 

Security Claim: Intel® Advanced Encryption Standard–New Instructions

Intel® Advanced Encryption Standard–New Instructions (Intel® AES-NI) requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://www.intel.com/content/www/us/en/architecture-and-technology/advanced-encryption-standard--aes-/data-protection-aes-generaltechnology.html.

 

Intel® Rapid Start Technology

Requires a select Intel® processor, Intel® software and BIOS update, and Intel® Solid-State Drive (SSD). Depending on system configuration, your results may vary. Contact your system manufacturer for more information.

 

Intel® Wireless Display

Requires an Intel® Wireless Display enabled PC, compatible adapter and TV. 1080p and Blu-ray* or other protected content playback only available on 2nd or 3rd gen Intel® Core™ processor-based PCs with built-in visuals enabled, a compatible adapter and media player, and

 

Claim: Built-in visuals

Built-in visual features are not enabled on all PCs and optimized software may be required. Check with your system manufacturer. Learn more at http://www.intel.com/go/biv.

 

Thunderbolt™ Technology

As compared with other PC I/O connection technologies including eSATA, USB, and IEEE 1394 Firewire*. Performance will vary depending on the specific hardware and software used. For more information go to http://www.intel.com/technology/io/thunderbolt.

 

Intel® Smart Connect Technology

Requires a select Intel® processor, Intel® software and BIOS update, Intel® wireless adapter, and Internet connectivity. Solid state memory or drive equivalent may be required. Depending on system configuration, your results may vary. Contact your system manufacturer for more information.

 

Intel® My WiFi Technology

Intel® My WiFi Technology is an optional feature and requires additional software and an Intel® Centrino® wireless adapter. WiFi devices must be certified by the WiFi Alliance for 802.11b/g/a in order to connect. See www.intel.com/network/connectivity/products/wireless/mywifi.htm for more details.

 

Claim: Quick Sync Video—3-year baseline

Video transcode claim using CyberLink* MediaEspresso 6 to render a 4-minute, 449 MB, 1920 x 1080i, 18884 Kbps, MPG2 video file for playback on an Apple* iPod* with resolution of 640 x 360, H.264, and file format of .MP4. Speedup is 4X faster on 3rd gen Intel® Core™ i5-3450 processor (desktop) and 3rd gen Intel® Core™ i5-3320M processor (laptop) compared with Intel® Core™ processor (desktop) and Intel® Core™2 Duo E8400 (desktop) and P8600 (laptop).

 

Security Claim: Intel® OS Guard

No system can provide absolute security. Requires an Intel® OS Guard-enabled system with a 3rd gen Intel® Core™ vPro™ processor and an enabled operating system. Consult your system manufacturer for more information.

 

Security Claim: Anti-Theft

No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware, and software with data encryption, and service activation with a capable service provider. Consult your system manufacturer and service provider for availability and functionality. Service may not be available in all countries.  Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-theft

 

Security Claim: Intel® AMT

Security features enabled by Intel® AMT require an enabled chipset, network hardware and software, and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, see http://www.intel.com/technology/platform-technology/intel-amt/.

 

KVM Remote Control

KVM Remote Control (Keyboard, Video, Mouse) is only available with Intel® Core™ i5 vPro™ and Core™ i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported.

 

Security Claim: Intel® Secure Key

No system can provide absolute security. Requires an Intel® Secure Key enabled PC with a 3rd gen Intel® Core™ vPro™ processor and software optimized to support Intel Secure Key. Consult your system manufacturer for more information.

 

Fact: 174M records were compromised

In 2011, over 174M records were compromised due to security breaches.
(Source: http://www.pcworld.com/article/252349/hackers_breached_174_million_records_in_2011.html )

 

Fact: over 750 organizations were victimized

In 2011, over 750 organizations were victimized by a massive cyber-attack on the world’s largest two-factor authentication vendor. It took months to revoke and re-provision tokens for affected users.
(Source: http://krebsonsecurity.com/2011/10/who-else-was-hit-by-the-rsa-attackers/ )

 

Fact: over 75 million malware samples

There are over 75 million unique malware samples in existence.
(Source: http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2011.pdf)

 

Fact: more than 200,000 newly discovered malware binaries

In the first dozen weeks of 2012 alone, more than 200,000 newly discovered malware binaries were identified.*
(Source: http://blogs.mcafee.com/mcafee-labs/signed-malware-you-can-runbut-you-cant-hide)

 

Fact: Over 12,000 laptops are lost or stolen each week

Over 12,000 laptops are lost or stolen each week from U.S. airports. The average cost of a lost or stolen laptop is $49,246.
(Source: http://www.ponemon.org/news-2/8)
http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%203.pdf)

 

Fact: Cost of losing laptop protected with encryption

The cost of losing a laptop protected by encryption is about $20,000 less than an unprotected laptop.
(Source: http://www.ponemon.org/local/upload/fckjail/generalcontent/18/file/Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%203.pdf)

 

Fact: 60,000 new pieces of malware per day

In 2010, McAfee detected an average of 60,000 new pieces of malware per day.
(Source: http://www.mcafee.com/us/resources/reports/rp-good-decade-for-cybercrime.pdf)

 

Fact: Annual cost of cybercrime globally is $114 Billion

The annual cost of cybercrime globally is estimated at $114,000,000,000.
(Source: http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02)

 

Intel® Core™ vPro™ Processor Performance Proof Point Disclaimer with Supporting FTC Disclaimer

 

FTC Disclaimer

Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.

 

Claim: Cross Client

Cross-client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurations and performance test as follows: (Mobile) Comparing pre-production 3rd generation Intel® Core™ i5-3320M Processor (4T2C, 3M cache, up to 3.20 GHz), Intel Reference Board, pre-production BIOS, Memory 8 GB (2x4 GB) Micron* PC3-12800, Hitachi* Travelstar 320 GB hard-disk drive, Intel® HD Graphics 4000, Driver pre-production 8.15.10.2616 , Chipset INF pre-production 9.3.0.1019. Intel® Core™2 Duo Processor P8600 (2T2C, 3M cache, 2.40 GHz, 1066 MHz FSB), HP* dv6, BIOS HP* vF.31, Memory 4 GB (2x2 GB) Micron* PC3-8500, Hitachi* 320 GB hard-disk drive, Mobile Intel® GM45 Chipset Family w/ integrated graphics Driver: 8.15.10.1749, Chipset INF 9.2.0.1030, Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601 (Desktop) Comparing pre-production 3rd generation Intel® Core™ i5-3450 Processor (4T4C, 6 MB cache, 3.1GHz base up to 3.5GHz), Intel® Desktop Board DH77KC, Memory 8 GB (2x4 GB) Micron* DDR3-1600, Seagate* 1 TB, Intel® HD Graphics 2500, Driver: 8.15.10.2616 (BIOS:vSLZ7510H.8 6A.0033.2011.1230.1146, Chipset INF 9.3.0.1019, Intel® Core™ 2 Duo E8400 (2C2T, 3.0GHz, 6MB cache), Memory 4 GB (2x2 GB) Micron* DDR2 800 MHz, Seagate* 1TB hard-disk drive, Intel® G45, Driver: 8.15.10.2189, (BIOS:IDG4510H.86A.0135.2011.0225.1100, INF), Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601

Business productivity claims based on SYSmark* 2012, which is the mainstream office productivity, data/financial analysis, system management, media creation, 3D modeling, and web development benchmark tool used to characterize the performance of the business client. SYSmark 2012 features user-driven workloads and usage models developed by application experts. Multitasking claims based on PCMark* 7, a hardware performance benchmark for PCs running Microsoft Windows* 7, includes a collection of various single- and multi-threaded CPU, graphics, and HDD test sets with a focus on Windows* application tests. Encryption workload consists of SiSoftware Sandra* 2011—AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm. For more information go to http://www.intel.com/performance.

 

Claim: vPro Benefits

Source: Intel. Results shown are from 2010/2011 Intel MSP Case Studies: Axcell Technologies, Speros, Circle Computer Resources, IT Guru, MidAmerica Computer Corporation, Green Light Business Technology, Do IT Smarter, Sabio Information Technologies, STF Consulting, Alvarez Technology Group, outsourceIT, Nex-Tech, Alpheon, Base 2, Dempsey Bluevar. http://msp.intel.com. Actual results may vary.