+ All Categories
Home > Documents > Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation...

Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation...

Date post: 03-Jan-2016
Category:
Upload: octavia-houston
View: 215 times
Download: 2 times
Share this document with a friend
Popular Tags:
7
Usage Notes Revision date: Feb 2011 Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions to small businesses. This material is focused on small business operational issues, and provides proof points based on industry research and Intel benchmarks. All messaging is approved for a non-NDA audience; however, this content is not intended for distribution directly to end-users in marketing or presentation materials. Usage guidance: Read and remove this slide BEFORE utilizing materials. Do not delete the legal information footnotes from the slides. This content is also available in an animated GIF format on SMCR for use on Intel websites as banners to drive resellers to additional sales training materials. Shelf life: January 2011 thru June 30, 2011. New products or information introduced during this period may result in an update to this document. Remove This Slide Before Using
Transcript

Usage Notes

Revision date: Feb 2011

Objective & Audience: This content provides sales conversation “starters” for companies that sell IT security solutions to small businesses. This material is focused on small business operational issues, and provides proof points based on industry research and Intel benchmarks.

All messaging is approved for a non-NDA audience; however, this content is not intended for distribution directly to end-users in marketing or presentation materials.

Usage guidance:• Read and remove this slide BEFORE utilizing materials. • Do not delete the legal information footnotes from the slides.• This content is also available in an animated GIF format on SMCR for use on Intel websites as banners to drive resellers to additional sales training materials.

Shelf life: January 2011 thru June 30, 2011. New products or information introduced during this period may result in an update to this document.

Remove This Slide Before Using

Visibly Smart.Small Business Technology Tips of the Week: Security

Reliable Solutions.

1 Symantec, 2010 SMB Information Protection Survey , http://www.symantec.com/content/en/us/about/media/pdfs/SMB_ProtectionSurvey_2010.pdf?om_ext_cid=biz_socmed_twitter_2010Jun_worldwide_SMB

46% of businesses that lose data, lose revenue.1

Reduce data loss with solutions that have security built-in.

Don’t Let Your Small Business Customers Lose Money

Learn more with “Selling Security Solutions to Small Business”

50% of Small Businesses Have Experienced Data Loss Within the Last Year1

Encrypt Data. Reduce Risk.

1Source: Rubicon Consulting, 2009, US based survey

2 Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence.  AES-NI is available select on Intel® Core™ processors.  For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/

Help your customers reduce risk with 2nd generation Intel® Core™ i5 processor-based PCs that encrypt data faster, thanks to built-in Intel® AES-NI Instructions2.

Learn more with “Selling Security Solutions to Small Business”

On Average, Small Businesses Experience Three Technology Disruptions a Year1

Remote Repair. Reduced Downtime.

1Source: SMB Disaster Preparedness Survey, Symantec, Q3 2009 http://www.symantec.com 2. KVM Remote Control (Keyboard Video Mouse) is only available with Intel® Core™ i5 vPro™ processors and i7 vPro™ processors with Intel® Active Management technology activated and configured and with integrated graphics active. Discrete graphics are not supported

Help keep your customers’ operations running smoothly with

2nd generation Intel® Core™ i5 vPro™ processor-based PCs with KVM Remote Control2 built in.

Learn more with “Selling Security Solutions to Small Business”

Protect Company Data

1“Notebook Total Cost of Ownership: 2008 Update,” Gartner, February 2008 (www.Gartner.com)2. No system can provide absolute security under all conditions.  Requires an enabled chipset, BIOS, firmware and software and a subscription with a capable Service Provider.  Consult your system manufacturer and Service Provider for availability and functionality.  Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof.  For more information, visit http://www.intel.com/go/anti-theft

Minimize the risk of laptop theft or loss with laptops built with 2nd generation Intel® Core™ processors and enabled with Intel® Anti-Theft Technology2

A Laptop is Stolen Every 53 Seconds1

Learn more “Selling Security Solutions to Small Business”

Help keep customer information safer and employees more productive.

Your Customers Can Have Data Protection Without Impacting PerformanceVisibly Smart Performance

PCs built with 2nd generation Intel® Core™ i5 processors encrypt sensitive data up to 4X faster1 with built-in Intel® AES-NI.2

1Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Cross client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurationns: Mobile: pre-production Intel® Core™ i5-2520M processor based laptops to theoretical installed base of Intel® Core™2 Duo processor T7250. Desktop: pre-production Intel® Core™ i5-2400 processor based desktops to theoretical installed base of Intel® Core™2 Duo Processor E6550 with comparable frequency. For more information go to http://www.intel.com/performance 2. Intel ® AES-NI requires a computer system with an AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® Core™ processors. For availability, consult your system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni

Learn more with “Selling Security Solutions to Small Business”


Recommended