Breaking the Kubernetes Kill Chain: Host Path Mount
ThinClinet Data Center
1. Eugrid SecureClient Patent Pending Eugrid Inc. Minoru Ikeda CEO [email_address] Winner of the Software Product of the Year 2008 -An award presented by IPA( Information-Technology Promotion Agency) to outstanding software products - Ecological Thin-Client Solution by simply using existing PCs
2.
3. Core Technology = File Virtualization Technology Application Windows File System Virtual File System File Server Data acknowledged by users OS & Application The Department of Defense Trusted Computer System Evaluation Criteria, (DOD-5200.28-STD), also known as the Orange Book Implement Least Privilege to User Accounts ( LUA) approach No user data Display Usage User Data User Environment Hard Disk OS and Application User Data User Environment
4.
5.
6. ROI (2,000PC) Approx. 12.160 million yen/year 690 million yen/case (Average estimate costs for 5 years JNSA) Approx. 60,000,000 yen (2,000 clients) Risk Aversion Cost Reduction Initial installation cost Yearly profit for user Yearly Profit Reduction in costs for troubleshooting 4,320,000 yen Reduction in costs for organizational unification and changes 1,800,000 yen Reduction in costs for PC installation and disposition 4,000,000 yen
7.
8. External Internal No footprint in PC anytime, anywhere Basic System Data Center There is no data to be leaked at any point Internal use My Documents LAN/ WAN External use Mobile option SSL VPN Off-line Remote desktop Virtual desktop VPN Mobile Documents DeskTop Mobile Documents My Documents Internal ESC External ESC
9. Data can only be shared between pre-authorized PCs Conventional USB flash memory that can be used anywhere USB flash memory that can only be used with authorized PCs Within the company Branch office Partner company Within the company Used with PC at Home, Hotel, Competitors User authority ? Decision by User **** **** Are they safe Administrator authority User authority PCs pre-authorized by administrator Always encrypted Password and fingerprint authentication Loss & theft When using PC at home, Hotel, etc.
10. at your desk at the customers, etc. Off-Line Use Off-line External policy No footprint Data Center On-line Internal policy Data that are taken out Profile Mobile Documents Switch-over remain here at all times Off-line Synchronize External ThinClient Internal ThinClient