This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer.

Slides:



Advertisements
Similar presentations
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Ljubomir Ivaniš CPU d.o.o.
3rd Generation Intel ® Core vPro Processor The Business Case [Presenter:] [Title:] [Date:]
Selling Security Solutions to Small Businesses 2011.
© 2009 Lenovo Security at the Endpoint Henry Ramos.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Selling Cost Reduction Solutions to Small Business 2011.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
The future of Desktops Transform Your Desktop with Virtualization.
Motorola Mobility Services Platform (MSP3.2) Control Edition Optimizing use of your mobile assets Daphanie Wallace June 2008 Enterprise Mobility Solutions.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard.
Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog:
Operating System.
Intel ® vPro™ Expert Training 1 Module 2: Overview of Intel® vPro™ Features.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Chapter 7 Installing and Using Windows XP Professional.
Microsoft ® Official Course Module 9 Configuring Applications.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
eScan Total Security Suite with Cloud Security
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Chapter 4 System Software.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Chapter 3 - Computer Software
Week #7 Objectives: Secure Windows 7 Desktop
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Chapter Fourteen Windows XP Professional Fault Tolerance.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
Module 7: Fundamentals of Administering Windows Server 2008.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Partner Logo Overcoming Buyer Objections Q
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Chapter 14 Supporting Windows 2000 Professional. 14 You Will Learn… n About the different operating systems within the Windows 2000 suite n About the.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Welcome to Xandros Desktop Version 2.0. What is Xandros? The New Standard – Xandros is the award winning new standard for Desktop Operating System software.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Create setup scripts simply and easily.
Data Security & Business Continuity
Operating System Review
Operating System Review
Intel Active Management Technology
Only Windows 10 Pro devices
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Robust vPro Manageability & Security Intel® vPro™ Technology with AMT 7.0 Intel vPro with Active Management Technology (AMT) 7.0 allows in-house or outsourced IT to easily manage all software and hardware computing assets within your organization. Heal systems remotely regardless of the OS or system state and protect their enterprise from malicious software attacks. New AMT 7.0 provides host-based configuration for easy setup. Starting with the support for WS-Man, Intel AMT 7.0 conforms to the DASH standards. DASH delivers standards-based web services management (WS- Management) for desktop and mobile client systems. KVM (Keyboard, Video, and Mouse) and text console redirection support for remote management. USB and media redirection support for virtualization. BIOS (Basic Input and Output) management for remotely change BIOS settings. NIC (Network Interface Card) management for remote network settings. Operating system status for OS status update. Software update capability for remotely upgrading firmware and software. Battery management for remotely manage batteries.

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Robust vPro Manageability & Security Smart Card*/Acer Bio-Protection Fingerprint Reader Integrate smart card based authentication with your employee identification and shut down unwanted access. Acer Bio-Protection Fingerprint Reader only recognized your unique fingerprint and prevent unauthorized access to your system TPM 1.2 Compliant Design TPM (Trusted Platform Module) 1.2 is designed to assure the integrity of the client platform. Start the power-on boot process from a trusted condition and extend this trust until the OS has fully booted and applications running. TPM also allow a secure storage and reporting of security relevant metrics. and detect changes to previous configurations and derive decisions how to proceed. TPM conforms with corporate-level security requirement and lowers TCO over product life cycle. Other features of TPM 1.2 include disk encryption, password protection from dictionary or brute-force attacks, and digital rights management. * Smart card is only available on TM 6595

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Robust vPro Manageability & Security Multi-level Acer ProShield Security from BIOS- level up Multi-level Acer ProShield Security featuring pre-boot authentication (PBA) with BIOS/HDD password, alternative Windows log-on with built-in fingerprint reader, and TPM password for data protection. Create your own Personal Secure Drive (PSD) to seamlessly store and encrypt your critical files. Permanently remove unwanted files or folders from your computer beyond recovery with File Shredder utility. Import/export or remotely update BIOS settings with ease with manageability functions. Acer Backup/eRecovery Manager Acer Backup Manager empowers you backup your valuable data or media portfolio at ease and protect your intellectual asset. Acer eRecovery Management provides recovery on-demand for peace of mind Built-in anti-theft solution Built-in anti-theft solution with Intel Anti-Theft technology and Absolute Data Protection (ADP) by Absolute Software. Intel Anti-Theft technology is a hardware-based security mechanism desgined to protect your PC even when it is lost or stolen. ADP is an anti-theft software that allows users to track their PC if it's lost or stolen. When enabled, ADP, working in conjunction with Intel Anti- Theft technology, allows users to remotely delete files or freeze the stolen notebook for retrieval. Users can also obtain the geolocation of their stolen notebook.

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Intel vPro with AMT 7.0 Technology Marketing Brief What is Intel vPro with AMT 7.0? Benefits User Scenarios and Applications

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Intel vPro with AMT 7.0 Simplify IT’s/MSP’s ability to manage your system with KVM and host-based setup and configuration. More secure and robust virtualization with built in Intel® Virtualization and Intel® Trusted Execution Technology Security, multiplied Improve network traffic filtering and isolate clients under attack Automatic security agent’s verification and immediate remote restoration enhance your preventive security efforts. Deploy off-hours patches faster, speeding up patch saturation Hardware-assisted antivirus protection of Execute Disable Bit protects your PCs from certain viruses. Maximizing manageability Diagnose and repair both wired and wireless systems remotely Remote asset tracking and checks the presence of management agents virtually anytime. Host-based setup and configuration Activate your Intel vPro processor based PCs in a matter of minutes with streamlined scripts Remote troubleshooting and maintenance to dramatically lower manageability costs

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Benefits

This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc. Hardware KVM Remote Control Remote Power On/Off Remote Manageme nt Host-Based Configuration User Scenarios and Applications Simplify IT or service provider’s ability to manage your system with KVM Host-based configuration for rapid deployment of Intel vPro technology with streamlined script Massive power on/off ensure that tasks requiring a reboot are completed and confirmed Remote diagnosis and repair of client systems