1 / 17

Secured Desktop Solutions for the Cloud

Secured Desktop Solutions for the Cloud. www.chippc.com. August 2013. Info Tech Research Group. www.chippc.com. www.chippc.com. 2. Perfect for High Security Markets.

rhonda
Download Presentation

Secured Desktop Solutions for the Cloud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secured Desktop Solutions for the Cloud www.chippc.com August 2013

  2. Info Tech Research Group www.chippc.com www.chippc.com 2

  3. Perfect for High Security Markets Chip PC solutions were chosen by the world’s most demanding government, financial & military organizations thanks to providing top level secured desktop solutions • BNPP Paribas Global Bank • Israel Defence Forces (IDF) • Israel Ministry for Foreign Affairs • European Intelligence and Prime Minister offices • Royal Dutch Navy www.chippc.com 3

  4. Perfect for High Security Markets The multi-layered security approach: • Strong Management Security:leveraged windows security and protocols • Strong User & device Authentication:smart card, domain-based • Strong Local Software Security:Digital signage, no local data • Strong Peripherals control:via management or specific hardware models • Strong Physical Security:Unique wall-integrated form factor, locks and VESA www.chippc.com 4

  5. Strong Management Security • Xcalibur Global, Chip PC’s innovative management platform: • Provides administrator with granular policy based security control over users and devices • Management based on Active Directory policies, leveraging Windows Security Scheme • Full Multi-level administrative rights, delegation of control • Management protocols use selectable high-encryption, compression and port settings (non-SNMP) • Security desk, logging and events www.chippc.com www.chippc.com 5

  6. Strong User Authentication Strongest User Authentication mechanisms: • Integrated or external PC/SC PKI smart-card support • Domain and Active Directory based user security restrictions and privileges • Single Sign-on, Pass-through user authentication • Fully configurable Kerberos, NTLM and other authentications Active Directory User-based Authentication PKI smartcard authentication www.chippc.com www.chippc.com 6

  7. Strong Device Authentication Strongest Device Authentication mechanisms: • Allow only pre-approved, authorized devices to run on the network • Map all devices in the Xcalibur environment, indicating usage and physical location • Isolate and block unused spare devices • Configure device authentication separately per Farm/Site/Scope level Active Directory Task-based Authentication www.chippc.com www.chippc.com 7

  8. Smartcard Technology:Net iD plugin • Chip PC & SecMaker offer tightly integrated PKI solutions for Chip PC customers • The target is to extend the use of smart cards/user authentication to organizations, such as healthcare, that deploy smart card solutions • The Net iD plugin for LXD thin client establishes a simple and secure log-in routine to the network “This partnership means there is now a secure, flexible and cost effective way for companies to control user security, while also allowing the profiles and applications to follow users from device to device” Ronnie Johansson, SecMaker http://www.youtube.com/watch?feature=player_embedded&v=d6xwjuVN608 www.chippc.com www.chippc.com 8

  9. Strong Local Software Security • • Data safe - No user data or configuration stored on device! • • Secured operating system - only pre-defined authorized programs can run • • Virus immune with digitally signed local firmware and plug ins • • No BIOS, no BIOS vulnerabilities • • Secured browser option in kiosk mode • • Local Smartcard Support • • Kerberos logon on device• SSL encrypted communication • • USB redirect with XenDesktop www.chippc.com www.chippc.com 9

  10. Strong Peripherals Control • Block unauthorized insertion of data via peripherals: • • Block via management software: strict remote control and configuration of connected peripherals via management software • • Block via hardware: Chip PC designed high security thin client models with Fiber Optic SFP network interface and NO USB ports Block USB peripherals via management software Dedicated high security thin client with SFP network port and NO USB ports www.chippc.com www.chippc.com 10

  11. Strong Physical Security • Unique form factor of Jack PC wall mounted desktop with no exposed power sources • Secure small desktop form factors to be anchored with Kensington lock also securing keyboard and mouse or VESA mounting kits for display back panels • models with built-in PKI smart card option requiring physical insertion of personal card prior to login to device • models with built in SFP module to support both CAT5 and high security fiber optic networks Jack PC Removed from Locking in Housing with Extraction Tool • Dedicated high security thin clients: • SFP network port • Integrated PKI Smartcard • NO USB ports www.chippc.com www.chippc.com 11

  12. Chip PC the Green Solution • Lower power consumption than any PC or thin-client • Supporting any green government regulation • Best power/performance ratio • Smallest form-factor assures minimum carbon footprint and maximum recycling potential • Lead-Free RoHS full compliance • WEEE full compliance (Waste of Electric & Electronic devices) • Powered by Ethernet option (model pending) • Powered by monitor option (model pending) www.chippc.com www.chippc.com 12

  13. Government: Ministry for Foreign Affairs - Israel • Chip PC’s thin clients and management software are deployed in Israel’s Ministry for Foreign Affairs and remote sites of embassies around the world. • Thousands of Chip PC devices are deployed, all managed remotely with Xcalibur Global. • The project required especially high security levels; therefore the devices did not include USB ports at all to block any option of connecting USB-peripherals to the thin client and causing security breaches and data leakage. www.chippc.com 13

  14. Local Government: Financial Administration RZF – Germany • Chip PC won the largest thin client tender for German RZF - Financial Administration of North Rhine-Westphalia County. • 25,000 devices are installed and managed by Xcalibur global management software. • Deployment of thousands of devices was done in a few days thanks to Xcalibur Global intelligent allocation of policies and permissions in advance and remotely. • Reasons for choosing chip PC – security and manageability. www.chippc.com 14

  15. Our Customers “Chip PC thin client was the only product I could find that was able to stand up to the harsh environment such as ours. Don’t be mistaken though, it is about more than just durability and resistance - low power consumption, ease of management and top security come together to make it a really great solution.” Chuck Willis, Information Technology Manager, 3P Processing, USA “We tested many different devices from multiple manufacturers. Our final choice was Chip PC. Their solution greatly reduced the electricity consumption. We found it to be perfect for us - greener, quieter, reliable and easy to manage."Eric Guenette, IT Director, Berthelet, Canada www.chippc.com 15

  16. Our Customers www.chippc.com www.chippc.com 16

  17. Chip PC Technologies Thank you! www.chippc.com 17

More Related