Remote Manageability: Transactional Devices

Enhance the retail experience and improve device manageability

When retail devices like kiosks, point-of-sale, and ATM devices come with Intel® Core™ vPro™ technology,1 they can do more than ring up transactions. They enable richer customer experiences and remote management features2 that reduce the total cost of POS ownership and improve the serviceability of today’s sophisticated systems.

Intel processors with hardware-assisted remote support enable advanced POS transactional systems, with next-generation features that help:

  • Reduce the total cost of ownership: IT can quickly deploy security patches across PCs, remotely unlock encrypted drives, and manage data security settings
  • Shrink the cost of complexity: By standardizing on Intel® vPro technology, IT can eliminate complex and costly multi-vendor legacy solutions.
  • Improve security: Retail IT departments can accelerate data encryption/decryption using Intel® AES New Instructions (Intel® AES-NI)3 and reduce unwanted access to sensitive data on missing laptops using Intel® Anti-Theft Technology (Intel® AT).4
Enhance the retail experience and improve device manageability

 

Product and Performance Information

open

1. Intel® vPro™ technology is sophisticated and requires setup and activation. Availability of features and results will depend upon the setup and configuration of your hardware, software, and IT environments. To learn more visit: www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html. 

2. Security features enabled by Intel® Active Management Technology (Intel® AMT) require an enabled chipset, network hardware and software and a corporate network connection. Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting wirelessly, on battery power, sleeping, hibernating, or powered off. Setup requires configuration and may require scripting with the management console or further integration into existing security frameworks, and modifications or implementation of new business processes. For more information, visit http://www.intel.com/content/www/us/en/architecture-and-technology/intel-active-management-technology.html.

3. Intel® AES New Instructions (Intel® AES-NI) requires a computer system with an Intel® AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. Intel® AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni.

4. No computer system can provide absolute security. Requires an enabled Intel® processor, enabled chipset, and firmware and software optimized to use the technologies. Consult your system manufacturer and software vendor for more information.