We’re demonstrating our new Trusted Zero Client technology at NATO Edge October 25-27, 2022, Lotto Mons Expo in Mons, Belgium.
Customers with the highest security requirements, including some of the largest government agencies in the world, have relied on Zero Clients based on our PC-over-IP (PCoIP®) protocol for many years. Our new Trusted Zero Client technology builds on that solid foundation, bringing the very best in remoting security and performance to help IT integrate Zero Trust into their digital workspaces environment.
Trusted Zero Clients Take a Big Leap Forward in Security and Performance
OEMs will leverage our new Trusted Zero Client firmware to deliver ultra-secure Zero Client endpoints with the very best in remoting performance. These next-generation Trusted Zero Clients will be designed with Zero Trust Architecture security and PCoIP Ultra performance features, all managed by the Trust Center in a locked-down, secure solution.
During initialization, a chain of trust is established between the Zero Client and Trust Center. Once provisioned, the Zero Clients are continuously monitored for anomalies, such as connected peripherals, old firmware versions, security breaches, to validate access, provide system integrity controls and implement other zero trust principles as recommended by organizations like NIST.
Trusted Zero Clients for Your Zero Trust Architecture
Zero Trust is a strategy (and bundle of technologies) that replaces traditional perimeter-based security with a model focused on users, devices, applications, and assets. Users are not provided blanket access to applications, services, and files; they can only access the resources needed for a given task or function. Even within the company network, devices undergo verification and authentication checks at several points before accessing company data.
Extending trust principles beyond mere network access goes a long way to improving enterprise security. By requiring users and devices to authenticate themselves continuously and limiting resource access to only the files and data they need for the given task, users and devices are less vulnerable to hackers.
Built on Secured PCoIP Technology
The latest PCoIP protocol features and improved PCoIP Ultra performance deliver a secure, high-definition and highly responsive computing experience, even for the most demanding use cases. PCoIP uses advanced display compression to allow users remote access to their on-premises workstations or virtual machine instances in local data centers or public clouds from a broad range of endpoint devices.
Other protocols offer additional brute force lossless modes to overcome compression artifacts – these typically burden network or compute resources, resulting in throttled throughput and compromised interactivity. But with PCoIP technology, there is little difference for the user between working with a local computer or from a remote endpoint receiving a PCoIP streamed pixel representation of their desktop and applications. And from an IT perspective, remote desktops are more secure, as no data ever leaves the corporate environment.
Trusted Zero Client Availability
Trusted Zero Clients will be available in a variety of form factors from our partners, including 10ZiG Technology Ltd., Amulet Hotkey, Atrust, ClearCube, HP Inc., IO Corp, Leadtek, NCS Technologies Inc., Rangee GmbH, and VXL. Please contact your preferred supplier for more information about products and availability.