SlideShare a Scribd company logo
Eugrid SecureClient and Mobile Option
           Thin Client that Utilizes Existing Computers without Modification

1. Present Situation
   Leakage of personal information continues to pose a problem in all ages. Just
recently, a foreign engineer working as a permanent staff at a manufacturing company
tried to take out a large amount of highly confidential technical information and take it
back to his home country. The exposure of this incident appalled the manufacturing
industry.
   As you can see from this incident, the risk of information leakage is increasing more
than ever in every corner of the society.
   Although the thin client system, either server-based, blade or remote-boot, is one of
the ideal solutions that protects intentional leakage of information, there are several
defects such as:


       •    The cost of installation including necessary hardware is highly expensive.
       •    Existing computers become unnecessary.
       •    Lacks flexibility as the security level is difficult to adjust according to the
            change of situation.
 
2. Problems and Objectives
  To prevent information leakage from a large number of PC already installed in a
company is not an issue limited to special sectors such as financial institutes. It is a
social issue that intimidates all types of companies. Therefore, the introduction of a
security solution equivalent to the current thin client that can readily be installed in
ordinary companies at lower cost has been aspired.
  Eugrid SecureClient was developed to provide high security to a wide range of
sectors including ordinary companies and schools without a large amount of
investment. Another objective of the development was to increase the security of
mobile computers to the level equivalent to that of thin client, which was impossible
with the conventional technology.

3. Difference with Conventional Technology
   The conventional thin-client solution is a highly expensive solution as it requires the
installation of new hardware. It was therefore installed by only some companies where
security is a primary issue, such as banks and financial institutions, which can invest a
large amount of funds.
                                       E GRI e u e l n
                                        U  DS c rCi t
                                                    e
   Eugrid SecureClient
utilizes        ordinary       No need               Data & Environm ents
                                                                ronm ents
                                                                            C enter
                                                     D ata & Envi           Functi i es
                                                                                  onalti
computers     and     file     new Severs
servers     that     are
                                                      O S, A ppli on
                                                                i on
                                                                cati
                                                      O S, A pplcati
currently being used                  Data            Softw ares
                                                      Softw ares
without    having       to
make                 any                                                    C lent
                                                                               i
                                                      C PU and Hardw are
                                                      CPU and Hardw are     Functi i es
                                                                                   onalti
modification.            It     Exi ng PC
                                  sti
realizes a simulated
                              Continue to use         Displ & K eyboard
                                                      Di ay & K eyboard
                                                        splay



                                                                                            1
security level equivalent to that of the thin client by imposing software restrictions to
enhance security of the existing hardware resources.

   The most important restriction feature that forms the basis of Eugrid SecureClient is
the write-protect feature that nothing leaves traceable information of user data in the
internal disk of the computer. This restriction will always be active when the computer is
connected to the internal LAN, WAN or when using USB flash drives outside the
company. Windows and all the other applications that have been used on the computer
will remain installed on the internal hard disk, and can be started from the internal hard
disk as before.
   “Information that does not exist cannot be leaked” – this principle of thin client is
realized by preventing information from being saved under the control of the user.


     1.   Writing on to the internal hard disk of the computer is restricted.
     2.   While the use of Desktop and My Document area is authorized to the users
          and applications without restriction, the actual information is stored
          automatically in the center-controlled server.

  This virtualized redirection feature is activated dynamically when the user logs on,
and deactivated at the logoff. No footprint including the information itself and the
access path will remain on the computer. As a result, there is no information on the
computer that can be leaked.

  As the result, Eugrid SecureCliet doesn’t need any server resources in the data
center except storage devices. This can give great merit to the company.




                                                                                        2
Current thin client solution                                            Eugrid SecureClient



                               File Server                                                        File Server



                                                                                                                Full employ
                                                                                                                P ’s C U
                                                                                                                 C     P


                                                                                N need Servers
                                                                                 o



                                                VPN                                                                 VPN




                                              D t
                                               aa                P 、 S、 pplications
                                                                CU O A




  However, this feature alone will allow leakage if the data is opened using the
application and stored in an external storage media. Following restriction features are
mounted to prevent such leakage.
  It is also possible to place limitations such as restricting unnecessary modification of
settings or prohibiting printing.


      1.       Restrict the use of external storage media such as USB flash drive, FD and
               DVD
      2.       Prohibit printing
      3.       Restrict the use of original Windows features that allow selection from the
               Start menu, etc.
      4.       Restrict startup of applications installed in the computer
      5.       Restrict network connection

                                             Synchroni ng w i O U of A D
                                                     zi     th


  Si plfi Secure
   m i ed&                                                                                       Usabii Effi ency
                                                                                                      lty& ci




       Cal Center O perators
         l                                           Part ti e w orkers
                                                           m                              R egal Em pl
                                                                                                     oyees

           4                   2                                            2                                        2
                                                 3                                    3
       3
                               1                                            1                                        1


                     1.M em ory M edi
                                    a          2. Pri
                                                    nter      3. Wid wsU
                                                                  no    I 4. A pplcati
                                                                                 i ons                                        3
These features operate with Microsoft’s Active Directory (referred to as AD
hereafter), which is a tool that controls the users centrally and allows the above
restriction conditions to be set according to each organization unit (OU).
   The above settings can be modified any time by the administrator according to the
location, authorization level of the user and the information to be handled. Unlike the
rigid structure of the conventional thin client, it is possible to optimize the security level
while considering the convenience of the user.




                                                                                            4
4. Advantages of User
   While the user can use the existing computer with the same convenience as before,
all the information belonging to the user will be stored in the central server. Such
information will be dynamically accessible from the computer when the user logs on
and become completely detached from the computer when the user logs off.

  In other words, unlike conventional computers, the relationship between the
computer and the user is detached and independent.
   
  The user will have the following advantages:


      1.    The same computer can be shared by multiple users thereby promoting the
            effective use of the computer and decreasing the number of necessary
            computers.
      2.    Shared computers placed in meeting rooms, etc., can be used under your
            own system environment. Users can use the computer placed anywhere as
            your own computer.
      3.    Even if the computer breaks down, you can replace it and immediately
            restore it to provide your own system environment without interrupting
            business.
      4.    There is no need to delete data when disposing computers thereby reducing
            administrative cost and lowering risk of leakage.
      5.    When converting the existing system environment into thin client, the
            information inside the computer is automatically transferred so that
            installation and conversion costs can be kept to minimum.

5. Data free working environment
  When using this solution, the control center administers all the data inside the all
computers, therefore assuming the role of a powerful infrastructure that supports IT
Governance and SOX compliance.

                   C
                  P environment                              IDC

           D free w
            ata    orking space                      Centralized Data
                                                       Manag ent
                                                              em
       Offshore      Home      Headquarter               All PC data

            VPN           LAN/WAN




                                                   Enterprise backup,
           User can use normal PC as is
                                                  Monitoring and Control



                                                                                    5
6. Mobile Option
  Laptop computer is an important tool for corporations to enhance customer service
and to accelerate business speed. However, it entails high risk of information leakage
and the consequence, if information is leaked from the computer, is enormous.
  Conventional thin-client solutions, regardless of the method, require network
connection, and there is a large gap between the needs of the users that seek to use
their computer anywhere they want.

  Eugrid SecureClient’s Mobile option allows safe use of computer outside the
company even when network connection is unavailable. This is possible because the
system environment of the user as well as necessary operation information of the user
that are stored in the file server of the control center can be taken out as a unit using
the USB flash device, and the device can be connected to the computer and used
anywhere.

   The restriction conditions for outside usage set by the information administrator will
be applied so that the data taken out is guaranteed to be handled under the
environment intended by the information administrator.
   The aforementioned feature of Eugrid SecureClient that leaves no footprint in the
computer also applies to the mobile option as all the information is stored in the USB
flash device.
   Therefore, as long as you do not carry both the USB flash device and the laptop in
the same bag, there will be no risk of information leakage even if the laptop is stolen or
lost, as there is no information stored inside.



                                                                                        Out side of Company
    Inside of Company




                                                                              Outside
                        Policy




                                                                               Policy
                        Inside




                                 I
                                 nternal R ul
                                            e      Sw i
                                                      tch     External R ul
                                                                          e



                                                No footpri
                                                         nt
                                                No Data



  The USB flash drive is encoded with 256 bit AES. In addition, our unique security
provides an additional feature that forces the “reformat” dialog to appear on the display
when the stolen or lost USB flash drive is connected to the computer of the finder. The
USB flash drive, therefore cannot be used unless it is reformatted.

  Consequently, the information stored in the stolen or lost USB flash drive will be
deleted before it can be accessed.




                                                                                                              6
7. Mobile Option Merits
  This mobile solution consists of a combination of the server located in a secure area
within the company and the USB flash drive. This combination realizes unprecedented
security in mobile usage.

    1.   There will be no risk of information leakage as no footprint will be left in the
         laptop computer used outside the company.
    2.   The USB flash device, which stores user data and system environment as a
         set, can be connected to any computer installed with Eugrid SecureClient
         client software. The user’s own system environment will be restored upon
         logon.
    3.   Severe policy, independent of the policy inside the company, can be applied
         for usage outside the company.
    4.   The data taken out in the USB flash device will always remain original data on
         the server inside the company, so that you can keep track of the exact content
         of the information in case the USB flash device is lost or stolen.
    5.   The log data of the client computer inside and outside the company will be
         compiled on the server.
    6.   Information stored in the USB flash device will be deleted before it can be
         accessed if it is used in an inappropriate way.




                                                                                       7

More Related Content

What's hot

Puppet for Junos
Puppet for JunosPuppet for Junos
Puppet for Junos
Juniper Networks
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center Technologies
EMC
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
ITExamAnswers.net
 
Ne40 hardware-description
Ne40 hardware-descriptionNe40 hardware-description
Ne40 hardware-description
Precious Kamoto
 
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Juniper Networks
 
Containing Chaos
Containing ChaosContaining Chaos
Containing Chaos
Juniper Networks
 
Network Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and ScaleNetwork Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and Scale
Juniper Networks
 
Tool support for semi-automatic modularization of existing code bases
Tool support for semi-automatic modularization of existing code basesTool support for semi-automatic modularization of existing code bases
Tool support for semi-automatic modularization of existing code bases
yocaba
 
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
yocaba
 
101 cd 1345-1415
101 cd 1345-1415101 cd 1345-1415
101 cd 1345-1415
Chiou-Nan Chen
 
102 1630 1700
102 1630 1700102 1630 1700
102 1630 1700
Chiou-Nan Chen
 
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?  Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
EMC
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Juniper Networks
 
Simplifying Operations: Automation & Orchestration with Juniper Switching
Simplifying Operations: Automation & Orchestration with Juniper SwitchingSimplifying Operations: Automation & Orchestration with Juniper Switching
Simplifying Operations: Automation & Orchestration with Juniper Switching
Juniper Networks
 
Embedded Solutions 2010: Intel Multicore by Eastronics
Embedded Solutions 2010:  Intel Multicore by Eastronics Embedded Solutions 2010:  Intel Multicore by Eastronics
Embedded Solutions 2010: Intel Multicore by Eastronics
New-Tech Magazine
 
Cell management (e ran3.0 05)
Cell management (e ran3.0 05)Cell management (e ran3.0 05)
Cell management (e ran3.0 05)
Danilo Silvestri
 

What's hot (16)

Puppet for Junos
Puppet for JunosPuppet for Junos
Puppet for Junos
 
Data center Technologies
Data center TechnologiesData center Technologies
Data center Technologies
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Ne40 hardware-description
Ne40 hardware-descriptionNe40 hardware-description
Ne40 hardware-description
 
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...Network Configuration Example: Configuring Assured Forwarding for High-Defini...
Network Configuration Example: Configuring Assured Forwarding for High-Defini...
 
Containing Chaos
Containing ChaosContaining Chaos
Containing Chaos
 
Network Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and ScaleNetwork Test: EX8200 Virtual Chassis Performance and Scale
Network Test: EX8200 Virtual Chassis Performance and Scale
 
Tool support for semi-automatic modularization of existing code bases
Tool support for semi-automatic modularization of existing code basesTool support for semi-automatic modularization of existing code bases
Tool support for semi-automatic modularization of existing code bases
 
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
 
101 cd 1345-1415
101 cd 1345-1415101 cd 1345-1415
101 cd 1345-1415
 
102 1630 1700
102 1630 1700102 1630 1700
102 1630 1700
 
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?  Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
 
Simplifying Operations: Automation & Orchestration with Juniper Switching
Simplifying Operations: Automation & Orchestration with Juniper SwitchingSimplifying Operations: Automation & Orchestration with Juniper Switching
Simplifying Operations: Automation & Orchestration with Juniper Switching
 
Embedded Solutions 2010: Intel Multicore by Eastronics
Embedded Solutions 2010:  Intel Multicore by Eastronics Embedded Solutions 2010:  Intel Multicore by Eastronics
Embedded Solutions 2010: Intel Multicore by Eastronics
 
Cell management (e ran3.0 05)
Cell management (e ran3.0 05)Cell management (e ran3.0 05)
Cell management (e ran3.0 05)
 

Similar to Serverless Thin Client

PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
cynapspro GmbH
 
Cumulus Networks & Puppet Labs webinar
Cumulus Networks & Puppet Labs webinarCumulus Networks & Puppet Labs webinar
Cumulus Networks & Puppet Labs webinar
Cumulus Networks
 
Basic LAN types
Basic LAN typesBasic LAN types
Basic LAN types
LawrenceIgenewari
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
Secure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceSecure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open Source
Genuitec, LLC
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
ijtsrd
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
DevOps.com
 
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
ITProceed
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
Track2 -刘希斌----c ie-net-openstack-2012-apac
Track2 -刘希斌----c ie-net-openstack-2012-apacTrack2 -刘希斌----c ie-net-openstack-2012-apac
Track2 -刘希斌----c ie-net-openstack-2012-apac
OpenCity Community
 
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time 5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
DMC, Inc.
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
cynapspro GmbH
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal
 
Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
FirstComm
 
Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
Cloudnition Web Development & Online Marketing
 
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUsScalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Indrajit Poddar
 
Challenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor SystemsChallenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor Systems
Wojciech Koszek
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
 
Edp july 2011
Edp july 2011Edp july 2011
OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2
Naveen Joy
 

Similar to Serverless Thin Client (20)

PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
Cumulus Networks & Puppet Labs webinar
Cumulus Networks & Puppet Labs webinarCumulus Networks & Puppet Labs webinar
Cumulus Networks & Puppet Labs webinar
 
Basic LAN types
Basic LAN typesBasic LAN types
Basic LAN types
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Secure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open SourceSecure Delivery Center, Eclipse Open Source
Secure Delivery Center, Eclipse Open Source
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
 
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Track2 -刘希斌----c ie-net-openstack-2012-apac
Track2 -刘希斌----c ie-net-openstack-2012-apacTrack2 -刘希斌----c ie-net-openstack-2012-apac
Track2 -刘希斌----c ie-net-openstack-2012-apac
 
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time 5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
 
Firstcomm construction of a DR plan
Firstcomm construction of a DR planFirstcomm construction of a DR plan
Firstcomm construction of a DR plan
 
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUsScalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
 
Challenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor SystemsChallenges in Assessing Single Event Upset Impact on Processor Systems
Challenges in Assessing Single Event Upset Impact on Processor Systems
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Edp july 2011
Edp july 2011Edp july 2011
Edp july 2011
 
OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2OpenStack Summit Portland April 2013 talk - Quantum and EC2
OpenStack Summit Portland April 2013 talk - Quantum and EC2
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Serverless Thin Client

  • 1. Eugrid SecureClient and Mobile Option Thin Client that Utilizes Existing Computers without Modification 1. Present Situation Leakage of personal information continues to pose a problem in all ages. Just recently, a foreign engineer working as a permanent staff at a manufacturing company tried to take out a large amount of highly confidential technical information and take it back to his home country. The exposure of this incident appalled the manufacturing industry. As you can see from this incident, the risk of information leakage is increasing more than ever in every corner of the society. Although the thin client system, either server-based, blade or remote-boot, is one of the ideal solutions that protects intentional leakage of information, there are several defects such as: • The cost of installation including necessary hardware is highly expensive. • Existing computers become unnecessary. • Lacks flexibility as the security level is difficult to adjust according to the change of situation.   2. Problems and Objectives To prevent information leakage from a large number of PC already installed in a company is not an issue limited to special sectors such as financial institutes. It is a social issue that intimidates all types of companies. Therefore, the introduction of a security solution equivalent to the current thin client that can readily be installed in ordinary companies at lower cost has been aspired. Eugrid SecureClient was developed to provide high security to a wide range of sectors including ordinary companies and schools without a large amount of investment. Another objective of the development was to increase the security of mobile computers to the level equivalent to that of thin client, which was impossible with the conventional technology. 3. Difference with Conventional Technology The conventional thin-client solution is a highly expensive solution as it requires the installation of new hardware. It was therefore installed by only some companies where security is a primary issue, such as banks and financial institutions, which can invest a large amount of funds. E GRI e u e l n U DS c rCi t e Eugrid SecureClient utilizes ordinary No need Data & Environm ents ronm ents C enter D ata & Envi Functi i es onalti computers and file new Severs servers that are O S, A ppli on i on cati O S, A pplcati currently being used Data Softw ares Softw ares without having to make any C lent i C PU and Hardw are CPU and Hardw are Functi i es onalti modification. It Exi ng PC sti realizes a simulated Continue to use Displ & K eyboard Di ay & K eyboard splay 1
  • 2. security level equivalent to that of the thin client by imposing software restrictions to enhance security of the existing hardware resources. The most important restriction feature that forms the basis of Eugrid SecureClient is the write-protect feature that nothing leaves traceable information of user data in the internal disk of the computer. This restriction will always be active when the computer is connected to the internal LAN, WAN or when using USB flash drives outside the company. Windows and all the other applications that have been used on the computer will remain installed on the internal hard disk, and can be started from the internal hard disk as before. “Information that does not exist cannot be leaked” – this principle of thin client is realized by preventing information from being saved under the control of the user. 1. Writing on to the internal hard disk of the computer is restricted. 2. While the use of Desktop and My Document area is authorized to the users and applications without restriction, the actual information is stored automatically in the center-controlled server. This virtualized redirection feature is activated dynamically when the user logs on, and deactivated at the logoff. No footprint including the information itself and the access path will remain on the computer. As a result, there is no information on the computer that can be leaked. As the result, Eugrid SecureCliet doesn’t need any server resources in the data center except storage devices. This can give great merit to the company. 2
  • 3. Current thin client solution Eugrid SecureClient File Server File Server Full employ P ’s C U C P N need Servers o VPN VPN D t aa P 、 S、 pplications CU O A However, this feature alone will allow leakage if the data is opened using the application and stored in an external storage media. Following restriction features are mounted to prevent such leakage. It is also possible to place limitations such as restricting unnecessary modification of settings or prohibiting printing. 1. Restrict the use of external storage media such as USB flash drive, FD and DVD 2. Prohibit printing 3. Restrict the use of original Windows features that allow selection from the Start menu, etc. 4. Restrict startup of applications installed in the computer 5. Restrict network connection Synchroni ng w i O U of A D zi th Si plfi Secure m i ed& Usabii Effi ency lty& ci Cal Center O perators l Part ti e w orkers m R egal Em pl oyees 4 2 2 2 3 3 3 1 1 1 1.M em ory M edi a 2. Pri nter 3. Wid wsU no I 4. A pplcati i ons 3
  • 4. These features operate with Microsoft’s Active Directory (referred to as AD hereafter), which is a tool that controls the users centrally and allows the above restriction conditions to be set according to each organization unit (OU). The above settings can be modified any time by the administrator according to the location, authorization level of the user and the information to be handled. Unlike the rigid structure of the conventional thin client, it is possible to optimize the security level while considering the convenience of the user. 4
  • 5. 4. Advantages of User While the user can use the existing computer with the same convenience as before, all the information belonging to the user will be stored in the central server. Such information will be dynamically accessible from the computer when the user logs on and become completely detached from the computer when the user logs off. In other words, unlike conventional computers, the relationship between the computer and the user is detached and independent.   The user will have the following advantages: 1. The same computer can be shared by multiple users thereby promoting the effective use of the computer and decreasing the number of necessary computers. 2. Shared computers placed in meeting rooms, etc., can be used under your own system environment. Users can use the computer placed anywhere as your own computer. 3. Even if the computer breaks down, you can replace it and immediately restore it to provide your own system environment without interrupting business. 4. There is no need to delete data when disposing computers thereby reducing administrative cost and lowering risk of leakage. 5. When converting the existing system environment into thin client, the information inside the computer is automatically transferred so that installation and conversion costs can be kept to minimum. 5. Data free working environment When using this solution, the control center administers all the data inside the all computers, therefore assuming the role of a powerful infrastructure that supports IT Governance and SOX compliance. C P environment IDC D free w ata orking space Centralized Data Manag ent em Offshore Home Headquarter All PC data VPN LAN/WAN Enterprise backup, User can use normal PC as is Monitoring and Control 5
  • 6. 6. Mobile Option Laptop computer is an important tool for corporations to enhance customer service and to accelerate business speed. However, it entails high risk of information leakage and the consequence, if information is leaked from the computer, is enormous. Conventional thin-client solutions, regardless of the method, require network connection, and there is a large gap between the needs of the users that seek to use their computer anywhere they want. Eugrid SecureClient’s Mobile option allows safe use of computer outside the company even when network connection is unavailable. This is possible because the system environment of the user as well as necessary operation information of the user that are stored in the file server of the control center can be taken out as a unit using the USB flash device, and the device can be connected to the computer and used anywhere. The restriction conditions for outside usage set by the information administrator will be applied so that the data taken out is guaranteed to be handled under the environment intended by the information administrator. The aforementioned feature of Eugrid SecureClient that leaves no footprint in the computer also applies to the mobile option as all the information is stored in the USB flash device. Therefore, as long as you do not carry both the USB flash device and the laptop in the same bag, there will be no risk of information leakage even if the laptop is stolen or lost, as there is no information stored inside. Out side of Company Inside of Company Outside Policy Policy Inside I nternal R ul e Sw i tch External R ul e No footpri nt No Data The USB flash drive is encoded with 256 bit AES. In addition, our unique security provides an additional feature that forces the “reformat” dialog to appear on the display when the stolen or lost USB flash drive is connected to the computer of the finder. The USB flash drive, therefore cannot be used unless it is reformatted. Consequently, the information stored in the stolen or lost USB flash drive will be deleted before it can be accessed. 6
  • 7. 7. Mobile Option Merits This mobile solution consists of a combination of the server located in a secure area within the company and the USB flash drive. This combination realizes unprecedented security in mobile usage. 1. There will be no risk of information leakage as no footprint will be left in the laptop computer used outside the company. 2. The USB flash device, which stores user data and system environment as a set, can be connected to any computer installed with Eugrid SecureClient client software. The user’s own system environment will be restored upon logon. 3. Severe policy, independent of the policy inside the company, can be applied for usage outside the company. 4. The data taken out in the USB flash device will always remain original data on the server inside the company, so that you can keep track of the exact content of the information in case the USB flash device is lost or stolen. 5. The log data of the client computer inside and outside the company will be compiled on the server. 6. Information stored in the USB flash device will be deleted before it can be accessed if it is used in an inappropriate way. 7