Presentation is loading. Please wait.

Presentation is loading. Please wait.

Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions.

Similar presentations


Presentation on theme: "Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions."— Presentation transcript:

1 Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions to small businesses. This material is focused on small business operational issues, and provides proof points based on industry research and Intel benchmarks. All messaging is approved for a non-NDA audience; however, this content is not intended for distribution directly to end-users in marketing or presentation materials. Usage guidance: Read and remove this slide BEFORE utilizing materials. Do not delete the legal information footnotes from the slides. This content is also available in an animated GIF format on SMCR for use on Intel websites as banners to drive resellers to additional sales training materials. Shelf life: January 2011 thru June 30, 2011. New products or information introduced during this period may result in an update to this document. Remove This Slide Before Using

2 Visibly Smart. Small Business Technology Tips of the Week: Security

3 Reliable Solutions. 1Symantec, 2010 SMB Information Protection Survey, http://www.symantec.com/content/en/us/about/media/pdfs/SMB_ProtectionSurvey_2010.pdf?om_ext_cid=biz_socmed_twitter_2010Jun_worldwi de_SMB http://www.symantec.com/content/en/us/about/media/pdfs/SMB_ProtectionSurvey_2010.pdf?om_ext_cid=biz_socmed_twitter_2010Jun_worldwi de_SMB 46% of businesses that lose data, lose revenue. 1 Reduce data loss with solutions that have security built-in. Don’t Let Your Small Business Customers Lose Money Learn more with “Selling Security Solutions to Small Business”

4 50% of Small Businesses Have Experienced Data Loss Within the Last Year 1 Encrypt Data. Reduce Risk. 1 Source: Rubicon Consulting, 2009, US based survey 2 Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available select on Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/ Help your customers reduce risk with 2nd generation Intel ® Core™ i5 processor-based PCs that encrypt data faster, thanks to built-in Intel ® AES-NI Instructions 2. Learn more with “Selling Security Solutions to Small Business”

5 On Average, Small Businesses Experience Three Technology Disruptions a Year 1 Remote Repair. Reduced Downtime. 1 Source: SMB Disaster Preparedness Survey, Symantec, Q3 2009 http://www.symantec.comhttp://www.symantec.com 2. KVM Remote Control (Keyboard Video Mouse) is only available with Intel® Core™ i5 vPro™ processors and i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported Help keep your customers’ operations running smoothly with 2nd generation Intel ® Core™ i5 vPro™ processor-based PCs with KVM Remote Control 2 built in. Learn more with “Selling Security Solutions to Small Business”

6 Protect Company Data 1 “Notebook Total Cost of Ownership: 2008 Update,” Gartner, February 2008 (www.Gartner.com)www.Gartner.com 2. No system can provide absolute security under all conditions. Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider. Consult your system manufacturer and Service Provider for availability and functionality. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For more information, visit http://www.intel.com/go/anti-thefthttp://www.intel.com/go/anti-theft Minimize the risk of laptop theft or loss with laptops built with 2nd generation Intel ® Core™ processors and enabled with Intel ® Anti-Theft Technology 2 A Laptop is Stolen Every 53 Seconds 1 Learn more “Selling Security Solutions to Small Business”

7 Help keep customer information safer and employees more productive. Your Customers Can Have Data Protection Without Impacting Performance Visibly Smart Performance PCs built with 2nd generation Intel ® Core™ i5 processors encrypt sensitive data up to 4X faster 1 with built-in Intel® AES-NI. 2 1 Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Cross client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurationns: Mobile: pre-production Intel® Core™ i5-2520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T7250. Desktop: pre-production Intel® Core™ i5-2400 processor based desktops to theoretical installed base of Intel® Core™2 Duo Processor E6550 with comparable frequency. For more information go to http://www.intel.com/performancehttp://www.intel.com/performance 2. Intel ® AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni Learn more with “Selling Security Solutions to Small Business”


Download ppt "Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions."

Similar presentations


Ads by Google