Data Security & Business Continuity Ted Miller, Regional Sales Manager Mark Allen, Systems Engineer Thin Clients Why They Are Better Than PCs Business Continuity Data Security Rapport Management Software SEC-2572
Introduction to Thin Clients Simple Powerful Flexible Centralized application access Centralized application access + local browser Centralized application access + local browser + local applications Enhanced Windows-Based Terminal Custom Application Terminal Appliance
Thin Clients Have Compelling Advantages Reliability No moving parts, viruses, crashes, 9.5 times more reliable vs. PC. Security Protect critical data. Ensure business continuity. Easier Management Complete remote administration, no user tweaking. Accelerated Deployment HW is three times faster to deploy, simply plug into network. Acquisition Cost Robust appliances available for as low as $359 Lower TCO 20-57% less in total ownership cost vs. PCs They pay for themselves in 2 months. Every 2 months. For the life of the client
Gartner Decision Makers What is On Their Minds Reliability No moving parts, viruses, crashes, 9.5 times more reliable vs. PC. Disaster Recovery & Business Continuity Security Protect critical data. Ensure business continuity. Security and Privacy Issues Easier Management Complete remote administration, no user tweaking. Mobile and Wireless Technology Accelerated Deployment HW is three times faster to deploy, simply plug into network. Web Services Acquisition Cost Robust appliances available for as low as $359 CRM Lower TCO 20-57% less in total ownership cost vs. PCs They pay for themselves in 2 moths. Every 2 months. For the life of the client
Business Continuity PCs TCs CIOs should consider desktops which do not put data at risk of destruction by fire, flood, etc. Local hard disk data makes this difficult Key: avoid having any data in this vulnerable state Thin-client computing offers an ideal solution Destroy 1 or 1,000 thin-clients – what is lost? Protect and co-locate servers to safeguard data and keep you online TCs
What’s Important Has Changed What Our Customers Are Telling Us Now Security Management Total Cost of Ownership Before Total Cost of Ownership Management Security
Information Security: Authorization Integrity Non-Repudiation Authentication Confidentiality Local security model prevents unauthorized users from accessing server resources. Hardened by Silicon Valley Java Junkies Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
Information Security: Integrity Authorization Integrity Non-Repudiation Authentication Confidentiality Viruses and hackers cannot harm thin-client firmware, or corrupt security model. No local data can be lost if thin-client is stolen or destroyed. Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
Information Security: Non-Repudiation Authorization Integrity Non-Repudiation Authentication Confidentiality “I didn’t get your important e-mail, my PC was acting up.” No local storage means no local data loss risk. Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
Information Security: Confidentiality Authorization Integrity Non-Repudiation Authentication Confidentiality Built-in encryption technologies like Secure ICA ensure eyes only security of the most sensitive data throughout the connection Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
Information Security: Authentication Authorization Integrity Non-Repudiation Authentication Confidentiality Winterm supports one-, two- and three-factor authentication with login name, password, and now smart card and biometric technologies… Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
Multi-Factor Authorization What I Know (e.g.- a password) What I Am (e.g.- fingerprint) What I Have (e.g.- a smart card)
Smart Card Solution More Secure 2 Factor Authentication Identification + Pin / Password Authentication Convenient Identification + Auto-Authentication Full “hot-desk” support Automatic Launch of ICA, RDP or Browser Simple Flexible Implementation Centrally managed Revenue Numbers for the 3000 series (not including Compaq): CE software - 147 units shipped of the sellable Add-on, $3880 in Revenue CE Hardware - $21 Million in Revenue; 74% of company’s revenue - Margin: $6.4 Million! Average of 31% Margin More on improvement of processes later in slide show THANK YOU THANK YOU THANK YOU!!! Great job selling!
Most Secure 3 Factor Authentication Biometrics Solution Most Secure 3 Factor Authentication Available for 3000, 8000 and 9000 series WBTs. Convenient Just touch reader with finger for authentication “Un-spoofable” Combinations supported Simple Flexible Implementation Centrally managed Revenue Numbers for the 3000 series (not including Compaq): CE software - 147 units shipped of the sellable Add-on, $3880 in Revenue CE Hardware - $21 Million in Revenue; 74% of company’s revenue - Margin: $6.4 Million! Average of 31% Margin More on improvement of processes later in slide show THANK YOU THANK YOU THANK YOU!!! Great job selling!
Why Management Software is Key Frequent SW Updates Are a Fact of Life Quickly and Easily Implement New Citrix and Microsoft Protocol Enhancements Comprehensive Management Tools Protect Your Investment Ensure Lowest TCO Stop Physical Desktop Visits Maximize Functionality Adopt New or Advanced Peripherals With Ease Deliver Longest Productive Life Automate Client OS Upgrades; Avoid Obsolescence
Summary If security & business continuity are a concern, thin clients can help. Thin Client Evolution New uses New benefits Business Priority Evolution Sensitive & valuable data Unauthorized access
Data Security & Business Continuity Thin Clients Why They Are Better Than PCs Business Continuity Data Security Rapport Management Software