Looks like these are the things that Q57 has that H57 doesn't, according to what differences I saw between these 2 pages:
http://www.intel.com/products/desktop/chipsets/h57/h57-overview.htm
http://www.intel.com/products/desktop/chipsets/q57/q57-overview.htm
Intel® Core vPro processor family
PCs with a processor from the Intel® Core vPro processor family enable IT to take advantage of hardware-assisted security and manageability capabilities that enhance their ability to maintain, manage, and protect their business PCs.
Intel® Active Management Technology (Intel® AMT)◊1
Using built-in platform capabilities and popular third-party management and security applications, Intel® AMT allows IT to better discover, heal, and protect their networked computing assets.
Intel® Anti-Theft TechnologyΣ
Intel® Anti-Theft Technology (Intel® AT) allows systems to be disabled if they are lost or stolen. The technology can be used with or without a connection to the Internet or a corporate network. Intel AT can block the OS from loading, even if the hard drive is replaced or reformatted. Intel AT can also be used to disable access to data encryption keys and block access to valuable data on the hard drive, even if the drive is moved to a different system.
Intel® Trusted Execution Technology◊1
Intel® Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel® processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. Intel Trusted Execution Technology provides hardware-based mechanisms that help protect against software-based attacks and protects the confidentiality and integrity of data stored or created on the client PC.
Intel® Virtualization Technology (Intel® VT)◊1
Intel® VT combined with software-based virtualization solutions provide maximum system utilization by consolidating multiple environments into a single PC. With Intel vPro technology built into desktop PCs, IT can remotely manage systems while providing highly secure, centralized, and virtualized IT services to end users.