SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
Enterprise Mobility:
Increasing Productivity for Mobile Users
Intel’s Guide to Strengthening Security and Efficiency
September 2013
The Enterprise Is Going Mobile
Mobile devices are transforming business productivity. With the right
credentials, users can work any time, from any location, with data that is
accessible from the company network, the Web, or the cloud. Users can
stay connected, collaborate, and quickly complete tasks.
2
When users feel that their corporate-provided technology isn’t flexible
enough, they will fill that gap with their own mobile devices. In the United
States today:1
IT Must Secure Devices and Data
IT must balance the security requirements of the business
with the flexibility needs of users.
3
1 Source: Business end user research. Intel Insights and Marketing Research (IMR) Group (2012).
Phones
Tablets
Laptops
Personally owned devices
Work provided
61% 39%
39% 61%
77%23%
2 Source: “Firms Adopt Head-in-the-Sand Approach to Windows XP Support Cut-Off.” v3.co.uk (April 2013).
• Improve overall security by increasing control with IT-approved devices
• Reduce the number of unmanaged devices on your network
• Give employees the flexibility they want with the latest mobile technology
Mitigate Risk by Upgrading PCs
By taking a proactive approach to upgrading the devices in
your organization today, you can:
4
Did you know?
On April 8, 2014, Microsoft will
stop supporting the Windows*
XP SP3 operating system and
Office 2003.
NO security updates, fixes,
or support.
Roughly 40% of business
PCs still run the Windows XP
operating system.2
5
• Get more from virtualization and cloud technologies
• Simplify the upgrade process by integrating easily with traditional software, such as the
Windows* 7 operating system
• Upgrade to the Windows 8 operating system to prepare your business to accommodate
touch-based applications
Get the Latest Windows*
Operating System
When you move to the Windows* 7 or 8 operating system,
move up to an Ultrabook™ device. Inspired by Intel.
More intuitive
touch-capable interface3
Wirelessly connect
to large displays9
Remotely update and manage
out-of-band systems4
Thinner, lighter,13
and
2 in 1 form factors3
Extended battery life11
Faster and more
responsive12
Help protect data, system, and
access with embedded security1
Please visit intelsalestraining.com/pcrefresh/disclaimer for legal information pertaining to this infographic.
Choose Compatible Technology
6
• Save time and help reduce maintenance costs
• Gain compatibility with existing x86 applications, peripherals, and device drivers for
seamless integration
• Minimize the need for additional training and IT support
• 2 in 1 devices – Laptop when you need it. Tablet when you want it.
• Tablets for business – Performance you can carry, hassle-free compatibility.
• Ultrabook™ devices – Ultra versatile. Ultra responsive.
Give Employees Greater Flexibility
A range of Intel®-based business-class form factors deliver
the flexibility and mobility that users want.
7
3 Analysis on Intel Core™ i5 processor vs. competition. Source: Principled Technologies; report available at principledtechnologies.com/intel/Tablet_TCO_0113.pdf. Intel does not control or
audit the design or implementation of third-party benchmark data or web sites referenced in this document. Intel encourages all of its customers to visit the referenced web sites or others
where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase.
Runs third-party,
in-house, and modern
apps on a single device
Uncompromised
collaboration and
productivity wherever
you are
Compatible with
existing infrastructure
and lower TCO3
Choice of devices,
battery life, and
performance
• Threat management
• Identity and access
• Data protection
• Monitoring and remediation
4th Generation Intel® Core™ vPro™
Processors: Security
Built-in security features4
address key IT security concerns.
8
4 No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, and services,
and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details.
For more information, visit https://security-center.intel.com/.
• Wake devices in a flash with instant access to data5
• Multitask up to four times faster6
• Graphics performance that is 20 times better7
• Location-based services make it easy to locate resources
• More responsive and secure virtual experience
4th Generation Intel® Core™ vPro™
Processors: Productivity
Powerful performance for users
9
5 Requires a select Intel® processor, Intel software and BIOS update, and a solid-state drive (SSD) or hybrid drive. Depending on system configuration, your results may vary. Contact your system
manufacturer for more information.
6, 7 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are
measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other
information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
• Less than an inch thick,
in a range of designs and sizes
• Longer battery life
• Hardened chassis and stronger
hinges for durability
• 2 in 1 model is cost-efficient
for IT, convenient for users
2 in 1 Ultrabook™ Devices
A tablet when you want it,
a laptop when you need it
10
• Available in a range of sizes, compact
enough for travel and large enough to
handle group collaboration
• Multitask easily with multiple screens
open at once8
• Share information seamlessly, without
risking content deterioration such as
altered images or text
• Performance ranges from Intel® Atom™
processors to Intel® Core™ vPro™ processor
technology
Business-Class Tablets
A different way to work
11
8 Available on select Intel Core processors. Requires an Intel Hyper-Threading (HT) Technology–enabled system; consult with your PC manufacturer. Performance will vary depending on the
specific hardware and software used. For more information, including details on which processors support Intel HT Technology, visit intel.com/info/hyperthreading.
Remote Management Capabilities
12
• Full control of any device, in any operational state
• Track and manage thousands of devices with update, disable, wipe, or restore capabilities
- McAfee ePO* Deep Command* with Intel® Active Management Technology (Intel AMT)
• Minimize the need for additional training and IT support
Employees can gain the flexibility they
want with the latest Intel-based devices:
• Ultrabook™ devices offer power and performance in a sleek design
• 2 in 1 devices provide a tablet when you want it,
a laptop when you need it
• Tablets are now built for business, in a range of sizes
Future-Proof Your Business
Mobile devices based on the 4th generation
Intel® Core™ vPro™ processor are designed
to strengthen security and increase
productivity across the enterprise.
13
To find out more about upgrading the PCs in your IT
environment, visit intel.com/pcupgrade.
Or visit the following web sites:
• Tablets based on the Intel® architecture: intel.com/tabletforbusiness
• Ultrabook™ in the enterprise: intel.com/ultrabookforbusiness
• Intel vPro™ technology: intel.com/vpro
Learn More
To learn more about mobile productivity in the enterprise, visit
intel.com/mobileproductivity.
14
Visit the Intel® IT Center
15
Intel.com/ITCenter
Legal
16
This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT,
FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of
any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein.
Copyright © 2013 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Intel vPro, the Look Inside. logo, Ultrabook, and Xeon are trademarks of Intel Corporation in the
U.S. and other countries.
*Other names and brands may be claimed as the property of others.
0913/LM/ME/PDF-USA
Enterprise Mobility Increasing Productivity for Mobile Users

Mais conteúdo relacionado

Mais de Intel IT Center

FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel IT Center
 

Mais de Intel IT Center (20)

FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Big Data Analytics Applications Showcase
 

Último

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Enterprise Mobility Increasing Productivity for Mobile Users

  • 1. Enterprise Mobility: Increasing Productivity for Mobile Users Intel’s Guide to Strengthening Security and Efficiency September 2013
  • 2. The Enterprise Is Going Mobile Mobile devices are transforming business productivity. With the right credentials, users can work any time, from any location, with data that is accessible from the company network, the Web, or the cloud. Users can stay connected, collaborate, and quickly complete tasks. 2
  • 3. When users feel that their corporate-provided technology isn’t flexible enough, they will fill that gap with their own mobile devices. In the United States today:1 IT Must Secure Devices and Data IT must balance the security requirements of the business with the flexibility needs of users. 3 1 Source: Business end user research. Intel Insights and Marketing Research (IMR) Group (2012). Phones Tablets Laptops Personally owned devices Work provided 61% 39% 39% 61% 77%23%
  • 4. 2 Source: “Firms Adopt Head-in-the-Sand Approach to Windows XP Support Cut-Off.” v3.co.uk (April 2013). • Improve overall security by increasing control with IT-approved devices • Reduce the number of unmanaged devices on your network • Give employees the flexibility they want with the latest mobile technology Mitigate Risk by Upgrading PCs By taking a proactive approach to upgrading the devices in your organization today, you can: 4 Did you know? On April 8, 2014, Microsoft will stop supporting the Windows* XP SP3 operating system and Office 2003. NO security updates, fixes, or support. Roughly 40% of business PCs still run the Windows XP operating system.2
  • 5. 5 • Get more from virtualization and cloud technologies • Simplify the upgrade process by integrating easily with traditional software, such as the Windows* 7 operating system • Upgrade to the Windows 8 operating system to prepare your business to accommodate touch-based applications Get the Latest Windows* Operating System When you move to the Windows* 7 or 8 operating system, move up to an Ultrabook™ device. Inspired by Intel. More intuitive touch-capable interface3 Wirelessly connect to large displays9 Remotely update and manage out-of-band systems4 Thinner, lighter,13 and 2 in 1 form factors3 Extended battery life11 Faster and more responsive12 Help protect data, system, and access with embedded security1 Please visit intelsalestraining.com/pcrefresh/disclaimer for legal information pertaining to this infographic.
  • 6. Choose Compatible Technology 6 • Save time and help reduce maintenance costs • Gain compatibility with existing x86 applications, peripherals, and device drivers for seamless integration • Minimize the need for additional training and IT support
  • 7. • 2 in 1 devices – Laptop when you need it. Tablet when you want it. • Tablets for business – Performance you can carry, hassle-free compatibility. • Ultrabook™ devices – Ultra versatile. Ultra responsive. Give Employees Greater Flexibility A range of Intel®-based business-class form factors deliver the flexibility and mobility that users want. 7 3 Analysis on Intel Core™ i5 processor vs. competition. Source: Principled Technologies; report available at principledtechnologies.com/intel/Tablet_TCO_0113.pdf. Intel does not control or audit the design or implementation of third-party benchmark data or web sites referenced in this document. Intel encourages all of its customers to visit the referenced web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase. Runs third-party, in-house, and modern apps on a single device Uncompromised collaboration and productivity wherever you are Compatible with existing infrastructure and lower TCO3 Choice of devices, battery life, and performance
  • 8. • Threat management • Identity and access • Data protection • Monitoring and remediation 4th Generation Intel® Core™ vPro™ Processors: Security Built-in security features4 address key IT security concerns. 8 4 No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, and services, and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details. For more information, visit https://security-center.intel.com/.
  • 9. • Wake devices in a flash with instant access to data5 • Multitask up to four times faster6 • Graphics performance that is 20 times better7 • Location-based services make it easy to locate resources • More responsive and secure virtual experience 4th Generation Intel® Core™ vPro™ Processors: Productivity Powerful performance for users 9 5 Requires a select Intel® processor, Intel software and BIOS update, and a solid-state drive (SSD) or hybrid drive. Depending on system configuration, your results may vary. Contact your system manufacturer for more information. 6, 7 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
  • 10. • Less than an inch thick, in a range of designs and sizes • Longer battery life • Hardened chassis and stronger hinges for durability • 2 in 1 model is cost-efficient for IT, convenient for users 2 in 1 Ultrabook™ Devices A tablet when you want it, a laptop when you need it 10
  • 11. • Available in a range of sizes, compact enough for travel and large enough to handle group collaboration • Multitask easily with multiple screens open at once8 • Share information seamlessly, without risking content deterioration such as altered images or text • Performance ranges from Intel® Atom™ processors to Intel® Core™ vPro™ processor technology Business-Class Tablets A different way to work 11 8 Available on select Intel Core processors. Requires an Intel Hyper-Threading (HT) Technology–enabled system; consult with your PC manufacturer. Performance will vary depending on the specific hardware and software used. For more information, including details on which processors support Intel HT Technology, visit intel.com/info/hyperthreading.
  • 12. Remote Management Capabilities 12 • Full control of any device, in any operational state • Track and manage thousands of devices with update, disable, wipe, or restore capabilities - McAfee ePO* Deep Command* with Intel® Active Management Technology (Intel AMT) • Minimize the need for additional training and IT support
  • 13. Employees can gain the flexibility they want with the latest Intel-based devices: • Ultrabook™ devices offer power and performance in a sleek design • 2 in 1 devices provide a tablet when you want it, a laptop when you need it • Tablets are now built for business, in a range of sizes Future-Proof Your Business Mobile devices based on the 4th generation Intel® Core™ vPro™ processor are designed to strengthen security and increase productivity across the enterprise. 13
  • 14. To find out more about upgrading the PCs in your IT environment, visit intel.com/pcupgrade. Or visit the following web sites: • Tablets based on the Intel® architecture: intel.com/tabletforbusiness • Ultrabook™ in the enterprise: intel.com/ultrabookforbusiness • Intel vPro™ technology: intel.com/vpro Learn More To learn more about mobile productivity in the enterprise, visit intel.com/mobileproductivity. 14
  • 15. Visit the Intel® IT Center 15 Intel.com/ITCenter
  • 16. Legal 16 This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION, OR SAMPLE. Intel disclaims all liability, including liability for infringement of any property rights, relating to use of this information. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Copyright © 2013 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Intel vPro, the Look Inside. logo, Ultrabook, and Xeon are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. 0913/LM/ME/PDF-USA