Risk
4/12/2011
05:14 PM
50%
50%

Lenovo Adds Secure Cloud Access To PCs

ThinkPad laptops and ThinkCentre desktops get a Lenovo software client that improves security when connecting to cloud applications.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)
Lenovo is giving business customers a secure and manageable way of accessing Web applications by adding a cloud-connecting client to its desktop and laptop computers.

The company on Tuesday announced Cloud Ready Clients, which are ThinkPad laptops and ThinkCentre desktops equipped with client software powered by webNetwork, an application delivery method developed by Lenovo partner Stoneware. The cloud-ready PCs have to be powered by Intel's second-generation Core or Core vPro processors.

Intel is involved because Lenovo uses the chipmaker's application programming interfaces that expose security, management, and power management features in the hardware. These features are used by Lenovo's client software, which it calls Secure Cloud Access.

SCA provides a browser-based interface for accessing applications deployed in a private or hybrid private/public cloud. The Lenovo software can be used on a smartphone or tablet, as well as a PC. Requirements include an Internet connection and a Java-enabled browser, such as Internet Explorer, Firefox, Chrome, and Safari. SCA uses its own browser on the desktop, providing the same look and feel as a standard browser with a task bar, recent history, and favorites.

Lenovo developed the client to provide customers the option of performing some computing tasks on the client, Bryan Thomas, manager of alternative client computing for Lenovo, said in an interview.

"We've got a lot of devices out there that have compute capabilities on them, but the bottom line is most cloud content services do not take advantage of those compute capabilities," Thomas said. "Everything that is being done now in the cloud is being done so that the data center is controlling all of the compute and that really is an unbalanced approach. We felt that it was a much more efficient approach to share that compute power on the endpoint and on the data center."

For example, customers could tie a fingerprint reader on a PC to a cloud application for authentication, Thomas said. SCA also can be used to automatically detect the hosting device's processor performance, free memory, graphics and available bandwidth, and then fit the application delivery within those parameters.

Available security methods includes SSL or VPN access, integration with Active Directory, eDirectory or LDAP directories, and the ability to incorporate additional layers of authentication when such security measures do not already exist on the device. SCA tries to prevent virus contamination by providing access to corporate applications and print and file resources, while walling off its intranet.

The cloud-ready software allows single sign-on to applications, whether Windows, Web, internal or hosted, and services. This is meant to reduce the number of password resets by IT management. Lenovo also offers a built-in fingerprint reader with its PCs to complement or replace application-unique passwords.

SCA has a starting price of about $80 per user, and is available only in North America.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2849
Published: 2015-07-07
SQL injection vulnerability in main.ant in the ANTlabs InnGate firmware on IG 3100, InnGate 3.01 E, InnGate 3.10 E, InnGate 3.10 M, SG 4, and SSG 4 devices, when https is used, allows remote attackers to execute arbitrary SQL commands via the ppli parameter.

CVE-2015-2850
Published: 2015-07-07
Cross-site scripting (XSS) vulnerability in index-login.ant in the ANTlabs InnGate firmware on IG 3100, InnGate 3.01 E, InnGate 3.10 E, InnGate 3.10 M, SG 4, and SSG 4 devices allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

CVE-2015-3216
Published: 2015-07-07
Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establi...

CVE-2014-3653
Published: 2015-07-06
Cross-site scripting (XSS) vulnerability in the template preview function in Foreman before 1.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted provisioning template.

CVE-2014-5406
Published: 2015-07-06
The Hospira LifeCare PCA Infusion System before 7.0 does not validate network traffic associated with sending a (1) drug library, (2) software update, or (3) configuration change, which allows remote attackers to modify settings or medication data via packets on the (a) TELNET, (b) HTTP, (c) HTTPS, ...

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report