Secured Desktop Solutions for the Cloud www.chippc.com August 2013.

Slides:



Advertisements
Similar presentations
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
Advertisements

1 Jack-PC Security Rev A Important!! Under NDA - Chip PC Proprietary and Confidential Information *CDC02264*
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
EToken PRO Anywhere. Agenda  eToken PRO Anywhere Overview  Market background and target markets  Identifying the opportunity  Implementation and Pricing.
BELKIN BUSINESS INTRODUCTION. Secure DVI-I KVM Switch w/ DCU support 2 P/NDate F1DN104GShipping F1DN104HShipping NIAP Certified EAL 4+ Protection Profile.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Product and feature presentation. tou of new features DIGITAL SIGNAGE SOLUTIONS FROM UNISEN INTERACTIVE.
The Perfect Desktop Solution for Virtualization and Cloud environments.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
1 We’ve come a long way… Chip PC – the Future of Computing October 2007.
Omni Introduction Page All About Omni and our Products.
The future of Desktops Transform Your Desktop with Virtualization.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
1Copyright 2011 FUJITSU Zero Clients Maximum Savings, Maximum Flexibility.
Netop Remote Control Trusted. Secure. Experienced.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Managing Windows Server 2008 R2 Lesson 2. Objectives.
Week #7 Objectives: Secure Windows 7 Desktop
Designing Active Directory for Security
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Module 5: Designing a Terminal Services Infrastructure.
I-Series Interactive Signage Product Overview
Chip PC Technologies 1 Chip PC Solutions in Verticals.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Operating System Security Fundamentals Dr. Gabriel.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Choosing a Network Camera The top 10 factors for making the right choice.
Payment and Wireless Technologies. Engineering Services. July 2015.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
V x 700: A Perfect Fit for Unattended Applications.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Innovative Desktop Solutions for the Cloud Jan 2013 Company Presentation Chip PC Technologies 1.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Reliable VPN Solutions IN IOT Environments
VCN510-16PD Video Cloud Node Technical Specifications Product Features
Secure Connected Infrastructure
VCN510-16P Video Cloud Node Technical Specifications Product Features
VCN510-8P Video Cloud Node Technical Specifications Product Features
A Solution for Every Network
Unit 27: Network Operating Systems
A Solution for Every Network
A Solution for Every Network
A Solution for Every Network
A Solution for Every Network
Designed for powerful live monitoring of larger installations
A Solution for Every Network
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Secured Desktop Solutions for the Cloud August 2013

2 Info Tech Research Group

Perfect for High Security Markets Chip PC solutions were chosen by the world’s most demanding government, financial & military organizations thanks to providing top level secured desktop solutions 3 BNPP Paribas Global Bank Israel Defence Forces (IDF) Israel Ministry for Foreign Affairs European Intelligence and Prime Minister offices Royal Dutch Navy

1)Strong Management Security: leveraged windows security and protocols 2)Strong User & device Authentication: smart card, domain-based 3)Strong Local Software Security: Digital signage, no local data 4)Strong Peripherals control: via management or specific hardware models 5)Strong Physical Security: Unique wall-integrated form factor, locks and VESA Perfect for High Security Markets 4 The multi-layered security approach:

Xcalibur Global, Chip PC’s innovative management platform: Provides administrator with granular policy based security control over users and devices Management based on Active Directory policies, leveraging Windows Security Scheme Full Multi-level administrative rights, delegation of control Management protocols use selectable high-encryption, compression and port settings (non-SNMP) Security desk, logging and events 5 Strong Management Security

6 Strong User Authentication Active Directory User-based Authentication Strongest User Authentication mechanisms: Integrated or external PC/SC PKI smart-card support Domain and Active Directory based user security restrictions and privileges Single Sign-on, Pass-through user authentication Fully configurable Kerberos, NTLM and other authentications PKI smartcard authentication

7 Strong Device Authentication Active Directory Task-based Authentication Strongest Device Authentication mechanisms: Allow only pre-approved, authorized devices to run on the network Map all devices in the Xcalibur environment, indicating usage and physical location Isolate and block unused spare devices Configure device authentication separately per Farm/Site/Scope level

Chip PC & SecMaker offer tightly integrated PKI solutions for Chip PC customers The target is to extend the use of smart cards/user authentication to organizations, such as healthcare, that deploy smart card solutions The Net iD plugin for LXD thin client establishes a simple and secure log-in routine to the network “This partnership means there is now a secure, flexible and cost effective way for companies to control user security, while also allowing the profiles and applications to follow users from device to device” Ronnie Johansson, SecMaker Smartcard Technology: Net iD plugin

Data safe - No user data or configuration stored on device! Secured operating system - only pre-defined authorized programs can run Virus immune with digitally signed local firmware and plug ins No BIOS, no BIOS vulnerabilities Secured browser option in kiosk mode Local Smartcard Support Kerberos logon on device SSL encrypted communication USB redirect with XenDesktop 9 Strong Local Software Security

Block unauthorized insertion of data via peripherals: Block via management software: strict remote control and configuration of connected peripherals via management software Block via hardware: Chip PC designed high security thin client models with Fiber Optic SFP network interface and NO USB ports 10 Strong Peripherals Control Dedicated high security thin client with SFP network port and NO USB ports Block USB peripherals via management software

Unique form factor of Jack PC wall mounted desktop with no exposed power sources Secure small desktop form factors to be anchored with Kensington lock also securing keyboard and mouse or VESA mounting kits for display back panels models with built-in PKI smart card option requiring physical insertion of personal card prior to login to device models with built in SFP module to support both CAT5 and high security fiber optic networks 11 Strong Physical Security Dedicated high security thin clients: SFP network port Integrated PKI Smartcard NO USB ports Jack PC Removed from Locking in Housing with Extraction Tool

Lower power consumption than any PC or thin-client Supporting any green government regulation Best power/performance ratio Smallest form-factor assures minimum carbon footprint and maximum recycling potential Lead-Free RoHS full compliance WEEE full compliance (Waste of Electric & Electronic devices) Powered by Ethernet option (model pending) Powered by monitor option (model pending) 12 Chip PC the Green Solution

13 Chip PC’s thin clients and management software are deployed in Israel’s Ministry for Foreign Affairs and remote sites of embassies around the world. Thousands of Chip PC devices are deployed, all managed remotely with Xcalibur Global. The project required especially high security levels; therefore the devices did not include USB ports at all to block any option of connecting USB-peripherals to the thin client and causing security breaches and data leakage. Government: Ministry for Foreign Affairs - Israel 13

14 Chip PC won the largest thin client tender for German RZF - Financial Administration of North Rhine-Westphalia County. 25,000 devices are installed and managed by Xcalibur global management software. Deployment of thousands of devices was done in a few days thanks to Xcalibur Global intelligent allocation of policies and permissions in advance and remotely. Reasons for choosing chip PC – security and manageability. Local Government: Financial Administration RZF – Germany 14

15 “Chip PC thin client was the only product I could find that was able to stand up to the harsh environment such as ours. Don’t be mistaken though, it is about more than just durability and resistance - low power consumption, ease of management and top security come together to make it a really great solution.” Chuck Willis, Information Technology Manager, 3P Processing, USA “We tested many different devices from multiple manufacturers. Our final choice was Chip PC. Their solution greatly reduced the electricity consumption. We found it to be perfect for us - greener, quieter, reliable and easy to manage." Eric Guenette, IT Director, Berthelet, Canada 15 Our Customers

16 Our Customers

Thank you! Chip PC Technologies 17