Risk
4/12/2011
05:14 PM
Connect Directly
RSS
E-Mail
50%
50%

Lenovo Adds Secure Cloud Access To PCs

ThinkPad laptops and ThinkCentre desktops get a Lenovo software client that improves security when connecting to cloud applications.

Slideshow: Cloud Security Pros And Cons
Slideshow: Cloud Security Pros And Cons
(click image for larger view and for full slideshow)
Lenovo is giving business customers a secure and manageable way of accessing Web applications by adding a cloud-connecting client to its desktop and laptop computers.

The company on Tuesday announced Cloud Ready Clients, which are ThinkPad laptops and ThinkCentre desktops equipped with client software powered by webNetwork, an application delivery method developed by Lenovo partner Stoneware. The cloud-ready PCs have to be powered by Intel's second-generation Core or Core vPro processors.

Intel is involved because Lenovo uses the chipmaker's application programming interfaces that expose security, management, and power management features in the hardware. These features are used by Lenovo's client software, which it calls Secure Cloud Access.

SCA provides a browser-based interface for accessing applications deployed in a private or hybrid private/public cloud. The Lenovo software can be used on a smartphone or tablet, as well as a PC. Requirements include an Internet connection and a Java-enabled browser, such as Internet Explorer, Firefox, Chrome, and Safari. SCA uses its own browser on the desktop, providing the same look and feel as a standard browser with a task bar, recent history, and favorites.

Lenovo developed the client to provide customers the option of performing some computing tasks on the client, Bryan Thomas, manager of alternative client computing for Lenovo, said in an interview.

"We've got a lot of devices out there that have compute capabilities on them, but the bottom line is most cloud content services do not take advantage of those compute capabilities," Thomas said. "Everything that is being done now in the cloud is being done so that the data center is controlling all of the compute and that really is an unbalanced approach. We felt that it was a much more efficient approach to share that compute power on the endpoint and on the data center."

For example, customers could tie a fingerprint reader on a PC to a cloud application for authentication, Thomas said. SCA also can be used to automatically detect the hosting device's processor performance, free memory, graphics and available bandwidth, and then fit the application delivery within those parameters.

Available security methods includes SSL or VPN access, integration with Active Directory, eDirectory or LDAP directories, and the ability to incorporate additional layers of authentication when such security measures do not already exist on the device. SCA tries to prevent virus contamination by providing access to corporate applications and print and file resources, while walling off its intranet.

The cloud-ready software allows single sign-on to applications, whether Windows, Web, internal or hosted, and services. This is meant to reduce the number of password resets by IT management. Lenovo also offers a built-in fingerprint reader with its PCs to complement or replace application-unique passwords.

SCA has a starting price of about $80 per user, and is available only in North America.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.