Intel® Anti-Theft Technology Risk Calculator
Laptop Theft Risk Calculator is developed by Ponemon Institute* using data gathered from industry studies. This tool will calculate the true cost of both losing and protecting your corporate laptops.
Results are simulated and are provided for informational purposes only. Results were derived from analysis and research performed by Ponemon Institute, as highlighted in the reports “Cost of a Lost Laptop” (2009) and “The Billion Dollar Laptop Problem” (2010). These results may vary, based on individual circumstances or other factors outside the scope of the original reports.
Intel does not control or audit the design or implementation of third party benchmark data or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmark data are reported and confirm whether the referenced benchmark data are accurate and reflect performance of systems available for purchase.
VideosView More Videos
Mobilize A Secure Workforce
Multi-level security with Intel® Anti-Theft Technology in laptops with Intel® Core™ vPro™...
Section 2: Intel® SCS Training
Covering Intel® AMT Configuration Utility, remote configuration services, and discovery of...
Protecting Enterprise Data
Speeding security software and making it stronger with silicon-based tools to increase...
Module 1: Introduction to...
Module 1: Introduction to Intel® vPro™ Technology
Intel® Setup and...
Intel® AMT setup is fast and easy with remote configuring and patching for time and cost...
Intel® SCS 8 Training...
Intel® SCS 8 Training Introduction
Inside IT: Enterprise...
Intel CSO Malcolm Harkins discusses security and privacy.
Inside IT: McAfee Drive...
Addressing challenges of maintaining productivity and reliability while protecting data.
Crimeware Protection on 4th...
See how built-in technologies offer protection in threat mitigation, identity, data, and...
Inside IT: Privacy Principles
Podcast: Discusses historic privacy principles and effective approaches that enhance business.
Defending Against Malware
Arm software with the visibility and tools it needs to prevent, find, freeze, and fix...
Changing Enterprise Protection
Working with companies to make security software that is enhanced by hardware.
Helping Protect Identity
Hardware-based verification and authentication helps guard identities without slowing...
Security in the Data Center...
Dylan Larson from Intel discusses the importance of data center security. (5:37)
Inside IT: Security by Design
Adding security throughout development and manufacturing.