Capital Markets: Risk Management Technology
Risk management: getting the right data
In today’s financial markets, the ability to mine and sort enormous amounts of information in order to properly calculate risk is what sets firms apart. Companies are in a race to find the intelligence buried in their data to enable better decision making and meet ever-tightening regulations. At the same time, there’s pressure to reduce costs and drive down power consumption.
These are new challenges. And new answers are provided by the Intel® Xeon® processor E7 family and Intel® Xeon® processor E5 family. In fact, leading risk-management software companies are creating applications that use the features in Intel® Xeon® processors to help meet demands across the financial services market segment.
Extreme Data Crunching
The Intel® Xeon® processor E7 family and Intel® Xeon® processor E5 family represent a leap ahead for Intel® Xeon® processors. They are built to deliver the flexibility, security, processing power, and throughput to handle today’s most data-intensive applications and risk-management systems.
“The next-generation Intel® Core™ microarchitecture has made a difference. We are seeing higher performance, quite a big gain.”
Intel® Xeon® processor E7 family
Systems powered by our latest processor, the Intel® Xeon® processor E7 family, are delivering a host of new reliability and security features and provide up to 25x the performance of older 4-socket single-core servers, enabling up to 29:1 server consolidation,1 up to 95 percent lower operating costs.23
With previous-generation Intel® Xeon® processors having proven their success, leading risk-management software companies are now optimizing software applications for the Intel Xeon processor E7 family.
Learn more about these efforts by visiting the Intel® Xeon® processor E7 family product page >
Intel® Xeon® processor E5 family
The intelligent performance of the Intel® Xeon® processor E5 family means existing risk management applications will usually see an immediate impact on performance delivered directly from the processor. Built-in security features such as Intel® Trusted Execution Technology (Intel® TXT) evaluate software component integrity and provide a hardware-based root of trust for enhanced security against malicious software attacks that occur before the virtual machine manager boots. Intel TXT also allows platform integrity status to be reported into management software, providing visibility and a powerful control point for managing the security of virtualized workloads.4
Along with increased performance and security comes peace of mind from knowing you’re running some of the most flexible and efficient servers available.
1. Requires an Intel® Hyper-Threading Technology (Intel® HT Technology)-enabled system, check with your PC manufacturer. Performance will vary depending on the specific hardware and software used. Not available on the Intel® Core™ i5-750. For more information, including details on which processors support HT technology, visit www.intel.com/content/www/us/en/architecture-and-technology/hyper-threading/hyper-threading-technology.html.
2. Claim based on comparison between 4S Intel® Xeon® MP CPU 3.3GHz (single core w/HT, 1 MB L2 8 MB L3, Potomac) and 4S Intel® Xeon® X7560 (8 core, 2.26GHz) processor-based servers. Calculation includes analysis based on performance, power, cooling, electricity rates, operating system annual license costs, and estimated server costs. This assumes 42U racks, $0.10 per kWh, cooling costs are 2x the server power consumptions costs, operating system license costs of USD 90/year per server, per server cost of USD 36,000 based on estimated lists prices, and estimated server utilization rates. All dollar figures are approximate. SPECint_rate_base2006* performance and power results are measured for X7560 and Xeon 3.3GHz processor-based servers. Platform power was measured during the steady state window of the benchmark run at idle. Performance gain compared to baseline was 20x. Costs and return on investment payback have been estimated based on internal Intel analysis and are provided for information purposes only.
3. Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations, and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.
4. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). The MLE could consist of a virtual machine monitor, an OS or an application. In addition, Intel TXT requires the system to contain a TPM v1.2, as defined by the Trusted Computing Group, and specific software for some uses. For more information, see www.intel.com/content/www/us/en/data-security/security-overview-general-technology.html.