Risk

4/12/2011
05:14 PM
50%
50%

Lenovo Adds Secure Cloud Access To PCs

ThinkPad laptops and ThinkCentre desktops get a Lenovo software client that improves security when connecting to cloud applications.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)
Lenovo is giving business customers a secure and manageable way of accessing Web applications by adding a cloud-connecting client to its desktop and laptop computers.

The company on Tuesday announced Cloud Ready Clients, which are ThinkPad laptops and ThinkCentre desktops equipped with client software powered by webNetwork, an application delivery method developed by Lenovo partner Stoneware. The cloud-ready PCs have to be powered by Intel's second-generation Core or Core vPro processors.

Intel is involved because Lenovo uses the chipmaker's application programming interfaces that expose security, management, and power management features in the hardware. These features are used by Lenovo's client software, which it calls Secure Cloud Access.

SCA provides a browser-based interface for accessing applications deployed in a private or hybrid private/public cloud. The Lenovo software can be used on a smartphone or tablet, as well as a PC. Requirements include an Internet connection and a Java-enabled browser, such as Internet Explorer, Firefox, Chrome, and Safari. SCA uses its own browser on the desktop, providing the same look and feel as a standard browser with a task bar, recent history, and favorites.

Lenovo developed the client to provide customers the option of performing some computing tasks on the client, Bryan Thomas, manager of alternative client computing for Lenovo, said in an interview.

"We've got a lot of devices out there that have compute capabilities on them, but the bottom line is most cloud content services do not take advantage of those compute capabilities," Thomas said. "Everything that is being done now in the cloud is being done so that the data center is controlling all of the compute and that really is an unbalanced approach. We felt that it was a much more efficient approach to share that compute power on the endpoint and on the data center."

For example, customers could tie a fingerprint reader on a PC to a cloud application for authentication, Thomas said. SCA also can be used to automatically detect the hosting device's processor performance, free memory, graphics and available bandwidth, and then fit the application delivery within those parameters.

Available security methods includes SSL or VPN access, integration with Active Directory, eDirectory or LDAP directories, and the ability to incorporate additional layers of authentication when such security measures do not already exist on the device. SCA tries to prevent virus contamination by providing access to corporate applications and print and file resources, while walling off its intranet.

The cloud-ready software allows single sign-on to applications, whether Windows, Web, internal or hosted, and services. This is meant to reduce the number of password resets by IT management. Lenovo also offers a built-in fingerprint reader with its PCs to complement or replace application-unique passwords.

SCA has a starting price of about $80 per user, and is available only in North America.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2607
PUBLISHED: 2018-05-21
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting vulnerability in console notes (SECURITY-382). Jenkins allows plugins to annotate build logs, adding new content or changing the presentation of existing content while the build is running. Malicious Jenkins users...
CVE-2018-1108
PUBLISHED: 2018-05-21
kernel drivers before version 4.17-rc1 are vulnerable to a weakness in the Linux kernel's implementation of random seed data. Programs, early in the boot sequence, could use the data allocated for the seed before it was sufficiently generated.
CVE-2018-11330
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. There is authenticated stored XSS because the character set for filenames is not properly restricted.
CVE-2018-11331
PUBLISHED: 2018-05-21
An issue was discovered in Pluck before 4.7.6. Remote PHP code execution is possible because the set of disallowed filetypes for uploads in missing some applicable ones such as .phtml and .htaccess.
CVE-2018-7687
PUBLISHED: 2018-05-21
The Micro Focus Client for OES before version 2 SP4 IR8a has a vulnerability that could allow a local attacker to elevate privileges via a buffer overflow in ncfsd.sys.