Download presentation
Presentation is loading. Please wait.
1
Data Security & Business Continuity
Ted Miller, Regional Sales Manager Mark Allen, Systems Engineer Thin Clients Why They Are Better Than PCs Business Continuity Data Security Rapport Management Software SEC-2572
2
Introduction to Thin Clients
Simple Powerful Flexible Centralized application access Centralized application access + local browser Centralized application access + local browser + local applications Enhanced Windows-Based Terminal Custom Application Terminal Appliance
3
Thin Clients Have Compelling Advantages
Reliability No moving parts, viruses, crashes, 9.5 times more reliable vs. PC. Security Protect critical data. Ensure business continuity. Easier Management Complete remote administration, no user tweaking. Accelerated Deployment HW is three times faster to deploy, simply plug into network. Acquisition Cost Robust appliances available for as low as $359 Lower TCO 20-57% less in total ownership cost vs. PCs They pay for themselves in 2 months. Every 2 months. For the life of the client
4
Gartner Decision Makers What is On Their Minds
Reliability No moving parts, viruses, crashes, 9.5 times more reliable vs. PC. Disaster Recovery & Business Continuity Security Protect critical data. Ensure business continuity. Security and Privacy Issues Easier Management Complete remote administration, no user tweaking. Mobile and Wireless Technology Accelerated Deployment HW is three times faster to deploy, simply plug into network. Web Services Acquisition Cost Robust appliances available for as low as $359 CRM Lower TCO 20-57% less in total ownership cost vs. PCs They pay for themselves in 2 moths. Every 2 months. For the life of the client
5
Business Continuity PCs TCs
CIOs should consider desktops which do not put data at risk of destruction by fire, flood, etc. Local hard disk data makes this difficult Key: avoid having any data in this vulnerable state Thin-client computing offers an ideal solution Destroy 1 or 1,000 thin-clients – what is lost? Protect and co-locate servers to safeguard data and keep you online TCs
6
What’s Important Has Changed What Our Customers Are Telling Us
Now Security Management Total Cost of Ownership Before Total Cost of Ownership Management Security
7
Information Security: Authorization
Integrity Non-Repudiation Authentication Confidentiality Local security model prevents unauthorized users from accessing server resources. Hardened by Silicon Valley Java Junkies Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
8
Information Security: Integrity
Authorization Integrity Non-Repudiation Authentication Confidentiality Viruses and hackers cannot harm thin-client firmware, or corrupt security model. No local data can be lost if thin-client is stolen or destroyed. Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
9
Information Security: Non-Repudiation
Authorization Integrity Non-Repudiation Authentication Confidentiality “I didn’t get your important , my PC was acting up.” No local storage means no local data loss risk. Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
10
Information Security: Confidentiality
Authorization Integrity Non-Repudiation Authentication Confidentiality Built-in encryption technologies like Secure ICA ensure eyes only security of the most sensitive data throughout the connection Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
11
Information Security: Authentication
Authorization Integrity Non-Repudiation Authentication Confidentiality Winterm supports one-, two- and three-factor authentication with login name, password, and now smart card and biometric technologies… Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”
12
Multi-Factor Authorization
What I Know (e.g.- a password) What I Am (e.g.- fingerprint) What I Have (e.g.- a smart card)
13
Smart Card Solution More Secure 2 Factor Authentication
Identification + Pin / Password Authentication Convenient Identification + Auto-Authentication Full “hot-desk” support Automatic Launch of ICA, RDP or Browser Simple Flexible Implementation Centrally managed Revenue Numbers for the 3000 series (not including Compaq): CE software units shipped of the sellable Add-on, $3880 in Revenue CE Hardware - $21 Million in Revenue; 74% of company’s revenue - Margin: $6.4 Million! Average of 31% Margin More on improvement of processes later in slide show THANK YOU THANK YOU THANK YOU!!! Great job selling!
14
Most Secure 3 Factor Authentication
Biometrics Solution Most Secure 3 Factor Authentication Available for 3000, 8000 and 9000 series WBTs. Convenient Just touch reader with finger for authentication “Un-spoofable” Combinations supported Simple Flexible Implementation Centrally managed Revenue Numbers for the 3000 series (not including Compaq): CE software units shipped of the sellable Add-on, $3880 in Revenue CE Hardware - $21 Million in Revenue; 74% of company’s revenue - Margin: $6.4 Million! Average of 31% Margin More on improvement of processes later in slide show THANK YOU THANK YOU THANK YOU!!! Great job selling!
15
Why Management Software is Key
Frequent SW Updates Are a Fact of Life Quickly and Easily Implement New Citrix and Microsoft Protocol Enhancements Comprehensive Management Tools Protect Your Investment Ensure Lowest TCO Stop Physical Desktop Visits Maximize Functionality Adopt New or Advanced Peripherals With Ease Deliver Longest Productive Life Automate Client OS Upgrades; Avoid Obsolescence
16
Summary If security & business continuity are a concern, thin clients can help.
Thin Client Evolution New uses New benefits Business Priority Evolution Sensitive & valuable data Unauthorized access
17
Data Security & Business Continuity
Thin Clients Why They Are Better Than PCs Business Continuity Data Security Rapport Management Software
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.