Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Intel Launches $300 Million Ultrabook Fund

Intel Capital, Intel’s global investment arm, today announced that it has created a $300 million Ultrabook™ Fund to help drive innovation of Intel’s vision of a new class of mobile computers that marry the performance and capabilities of today’s laptops with tablet-like features and deliver a highly responsive and secure experience, in a thin and light form factor.

Intel Capital, Intel’s global investment arm, today announced that it has created a $300 million Ultrabook™ Fund to help drive innovation of Intel’s vision of a new class of mobile computers that marry the performance and capabilities of today’s laptops with tablet-like features and deliver a highly responsive and secure experience, in a thin and light form factor.

Intel Capital Ultrabook FunUltrabook systems will include security features such as Intel Anti-Theft Technology and Intel Identity Protection Technology. Intel’s Anti-Theft Technology can take advantage of 3G networks, allowing IT administrators to use encrypted SMS messages over a 3G network to send a poison pill, remotely unlock a recovered laptop quickly, or direct the system to send GPS-based location information back to a central server. Intel Identity Protection Technology brings an additional layer of security that can link a PC to an online account, VPN or application that you select. It does this with two-factor authentication embedded directly into the chipsets. (These features work with select 2nd generation Intel Core Processor-based PCs.)

Related NewsDeveloper Challenges Force Insecure Devices to Market

Related Resource: Summer 2011 Device Developers’ Security Report

The fund will invest in select companies building hardware and software technologies to work with Ultrabooks, that could help improve user experiences, bring longer battery life and slim component and enabling innovative physical designs and improved storage capacity.

The overall goal of the fund, which will be invested over the next 3-4 years, is to create a cycle of innovation and system capabilities for this new and growing category of mobile devices.

“The Intel Capital Ultrabook fund will focus on investing in companies building technologies that will help revolutionize the computing experience and morph today’s mobile computers into the next ‘must have’ device,” said Arvind Sodhani, president of Intel Capital and Intel executive vice president. 

There are three key phases in Intel’s strategy to accelerate its vision for this new category. The company’s efforts begin to unfold this year with Intel’s latest 2nd Generation Intel Core processors. This family of products will enable thin, light and beautiful designs that are less than 21mm (0.8 inch) thick, and at mainstream prices. Systems based on these chips will be available for the 2011 winter holiday shopping season.

Advertisement. Scroll to continue reading.

To ship Ultrabook devices this year required significant collaboration amongst the entire computing industry. Intel has worked very closely with its customers to ensure that Ultrabook devices deliver compelling and unique value to consumers. Many OEMs have been collaborating on this effort from the very beginning.

The second phase of Intel’s vision happens around the next-generation Intel processor family codenamed “Ivy Bridge,” which is scheduled for availability in systems in the first half of 2012. Laptops based on “Ivy Bridge” will bring improved power efficiency, smart visual performance, increased responsiveness and enhanced security.

Intel’s planned 2013 products, codenamed “Haswell,” are the third step in the Ultrabook device progression and expected to reduce power consumption to half of the “thermal design point” for today’s microprocessors.

Intel Capital makes equity investments in innovative technology start-ups and companies worldwide and has invested more than US$10 billion in over 1,140 companies in 50 countries since 1991.

Related Resource: Summer 2011 Device Developers’ Security Report

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

The Zero Day Dilemma

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.