PC Upgrade: A Smart Business Move

Boost productivity. Increase data security. Cut IT costs.

At first glance, delaying the replacement of older PCs may seem like a prudent cost-saving strategy; however, in the long run, the rising cost to support aging PCs will begin to eclipse any expected savings—and may even cost your company more money.

Meeting the challenges of today’s evolving PC environment

Increasingly complex software, new cloud-based computing applications, and even Internet downloads can slow the performance of older hardware—limiting the productivity of employees. Older PCs are often more susceptible to new, aggressive security attacks. Upgrading to new PCs equipped with the latest Intel® Core™ vPro™ processors can help address these challenges.

It’s more than a performance upgrade. It’s embedded security technology.1

New Intel® Core™ vPro™ processor-based PCs come with embedded security that delivers unprecedented protection for your clients and business data.2 These distinctive built-in features are specially designed to address the key concerns of IT security management by providing:

Learn more:

Productivity and flexibility designed to fit any
business need

Diverse business models and employee roles require different technology solutions. Exciting new Ultrabook™ devices, tablets, and all-in-one desktops powered with Intel® Core™ vPro™ processors offer innovative high-performance technology choices to your employees—whether they are working at a desk or mobile.

Learn more:

Change is not only good, it’s essential.

Taking advantage of new enterprise operating system capabilities and software solutions can also boost productivity, strengthen security, and reduce PC management costs. 

Man and woman in office with Ultrabook

    

Windows* 7 upgrade

Many enterprises who still use Windows XP* as the operating system of choice for their environments will need to consider their migration plans, as Microsoft ends extended support for Windows XP in April 2014.

Easier migration. Greater performance.

Drawing on vast experience and expertise from across the industry, Intel has developed comprehensive best practices and innovative technologies to help your business get the most out of its migration to Windows 7. With the right processor, advance preparation, and smart deployment, you can save time, reduce expenses, and minimize disruption.

Learn more:

Windows* 8 upgrade

Not just a traditional OS update, Windows 8 represents a significant shift in device interaction, combining mainstream enterprise client computing with a touch-driven experience on a single platform. Deploying Windows 8  on new devices for use by highly mobile workers and custom work streams can boost business productivity, enhance customer service, and improve real-time decision making throughout your enterprise.

Seamless integration, complete compatibility

Intel processor-based devices are compatible with your company’s existing applications, peripherals, and drivers, ensuring a smooth Windows 8 Enterprise integration and protecting past infrastructure investments. Additionally, you can choose from the widest selection of devices with a variety of security, manageability, and performance options that span the family of Intel processors.

Performance you can put your finger on

You’ll also find a growing number of touch screen designs now available in business tablets, all-in-one PCs, and Ultrabook devices.9  So no matter which Intel processor-based device you choose, you’ll get the performance and compatibility you’ve come to expect.

Learn more:

IT Manager: Duels

IT Manager: Duels

They said IT management wasn’t fun and games. They were right. Join our new multiplayer IT strategy game. Deploy cutting-edge technologies. Wield colossal budgets. And crush your peers’ IT infrastructure. All in the name of winning real prizes.  

Play now

Product and Performance Information

open

1. No computer system can provide absolute security under all conditions. Built-in security features available on select Intel® processors may require additional software, hardware, services and/or an Internet connection. Results may vary depending upon configuration. Consult your system manufacturer for more details. For more information, see http://www.intel.com/content/www/us/en/security/security-at-home.html.

2. Intel® vPro™ Technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software and IT environment. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html.

3. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules, and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.

4. Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain platform software enabled for it. Functionality, performance, or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor.

5. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT) enabled system, including a 2nd or 3rd generation Intel® Core™ processor, enabled chipset, firmware, software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.

6. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI-enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.

7. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. Results have been measured by Intel based on software, benchmark or other data of third parties and are provided for informational purposes only.  Any difference in system hardware or software design or configuration may affect actual performance.  Intel does not control or audit the design or implementation of third party data referenced in this document.  Intel encourages all of its customers to visit the websites of the referenced third parties or other sources to confirm whether the referenced data is accurate and reflects performance of systems available for purchase.

8. Cross-client claim based on lowest performance data number when comparing desktop and mobile benchmarks. Configurations and performance test as follows: (Mobile) Comparing pre-production 3rd generation Intel® Core™ i5-3320M Processor (4T2C, 3MB cache, up to 3.20 GHz), Intel Reference Board, pre-production BIOS, Memory 8 GB (2x4 GB) Micron* PC3-12800, Hitachi* Travelstar 320 GB hard-disk drive, Intel® HD Graphics 4000, Driver pre-production 8.15.10.2616 , Chipset INF pre-production 9.3.0.1019. Intel® Core™2 Duo Processor P8600 (2T2C, 3M cache, 2.40 GHz, 1066 MHz FSB), HP* dv6, BIOS HP* vF.31, Memory 4 GB (2x2 GB) Micron* PC3-8500, Hitachi* 320 GB hard-disk drive, Mobile Intel® GM45 Chipset Family w/ integrated graphics Driver: 8.15.10.1749, Chipset INF 9.2.0.1030, Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601 (Desktop) Comparing pre-production 3rd generation Intel® Core™ i5-3450 Processor (4T4C, 6 MB cache, 3.1GHz base up to 3.5GHz), Intel® Desktop Board DH77KC, Memory 8 GB (2x4 GB) Micron* DDR3-1600, Seagate* 1 TB, Intel® HD Graphics 2500, Driver: 8.15.10.2616 (BIOS:vSLZ7510H.8 6A.0033.2011.1230.1146, Chipset INF 9.3.0.1019, Intel® Core™ 2 Duo E8400 (2C2T, 3.0GHz, 6MB cache), Memory 4 GB (2x2 GB) Micron* DDR2 800 MHz, Seagate* 1TB hard-disk drive, Intel® G45, Driver: 8.15.10.2189, BIOS:IDG4510H.86A.0135.2011.0225.1100, INF), Microsoft Windows* 7 Ultimate 64-bit 6.1 Build 7601 Business productivity claims based on SYSmark* 2012, which is the mainstream office productivity, data/financial analysis, system management, media creation, 3D modeling, and web development benchmark tool used to characterize the performance of the business client. SYSmark 2012 features user-driven workloads and usage models developed by application experts. Multitasking claims based on PCMark* 7, a hardware performance benchmark for PCs running Microsoft Windows* 7, includes a collection of various single- and multi-threaded CPU, graphics, and HDD test sets with a focus on Windows* application tests. Encryption workload consists of SiSoftware Sandra* 2011—AES256 CPU Cryptographic subtest measures CPU performance while executing AES (Advanced Encryption Standard) encryption and decryption algorithm. For more information go to http://www.intel.com/performance.

9. Ultrabook™ products are offered in multiple models.  Some models may not be available in your market.  Consult your Ultrabook™ manufacturer. For more information and details, visit www.intel.com/content/www/us/en/sponsors-of-tomorrow/ultrabook.html.