Perimeter
2/6/2014
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NCS Technologies Introduces Cirrus LT, Mobile PCoIP Zero Client Laptop Computer

Device uses virtualization approach enhances security

GAINESVILLE, Va., Feb. 4, 2014 /PRNewswire/ -- NCS Technologies, Inc. (www.ncst.com), a leading domestic computing systems manufacturer, today introduced the Cirrus LT PCoIP zero client laptop, a compact notebook that is highly secure and delivers all the functionality of a traditional desktop or laptop computer. The mobile zero client laptop, complete with docking station, battery and Wi-Fi capability, represents a new computing category.

Until today, zero-client computing has been defined as a small, stationary desktop device that has no hard drive, no local storage and no operating system. This device connects a keyboard, monitor and mouse to a data center server. Benefits of this virtualization approach include enhanced security, reduced costs, improved energy efficiency and ease of deployment and administration.

Cirrus LT takes advantage of the strongest security protocols, AES-256 cryptography and NSA Suite B ciphers, when used in conjunction with a PCoIP Remote Workstation Card. It doesn't retain any user data because it doesn't have local storage, hard drive or an operating system. That means secrets won't be compromised if the device is lost, physically broken into or stolen.

The mobile zero client laptop is based on Teradici PCoIP® technology. The PCoIP protocol compresses, encrypts and encodes the entire computing experience at the data center and transmits only pixels across the IP network. Users have fully functional, effortless access to all applications. Cirrus LT can move around an office building or go along on business trips – new with zero client computing.

"Teradici's PCoIP technology was designed to deliver a high performance, secure and easy to manage user experience for virtual desktop and remote workstation users on any device and on any network," said Ziad Lammam, director of product management, Teradici Corporation. "The new Cirrus LT PCoIP zero client laptop combines PCoIP technology and NCS computing innovation to answer the call for a more secure computing capability in today's increasingly mobile environment."

Engineered for low cost of ownership, Cirrus LT is compatible with VMware Horizon View and high-performance PCoIP Remote Workstation environments, delivering a highly efficient IT administrative experience. Cirrus LT supports copper, fiber and Wi-Fi.

"In our research we found a great demand for a secure mobile solution that features the simplicity and performance of a zero client," said Brian Gentry, NCS vice president, engineering. "With Cirrus LT, secure computing now moves to where you need it most – down the hall, at home, or to a hotel thousands of miles away."

"We have determined the key markets for zero client laptops include all government agencies including the military, the intelligence community and education," Gentry said. "We have also identified strong interest from commercial markets including medical/health care, banking and financial services – anywhere where security, mobility and efficiency are critical to doing business."

Cirrus LT Specs

· Teradici PCoIP processor TERA2321

· Storage: No local storage

· Display: 14" HD 16:9 LCD, 1366x768 with anti-glare, LED backlight or 14" HD+ 16:9 LCD, 1600x900 with anti-glare, LED backlight

· Image Performance: 50 Mpps (VDI); 130 Mpps (workstation)

· Networking: Integrated Realtek 10/100/1000Mb Base-TX Ethernet LAN; Ralink 802.11 a/b/g/n 3T3R 450mbps LAN; 100.1000Mb Fiber SFP support in port replicator; wake on LAN and wake on USB support

· Battery: Primary 6-cell Li-Ion smart battery (5,200mAh)

· Dimensions & Weight: 13.375" x 9.25" x 1.125"-1.25"; 3.62 lbs.

Cirrus LT is generally available in the second quarter. For more product information, contact NCS sales at 703-743-8548. See Cirrus LT this month at the AFCEA CyberSpace Symposium, Booth 53a; AFCEA West, Booth 1021; VMware Partner Exchange (PEX), Booth 438; and AUSA, Booth 206. For more information, visit http://www.ncst.com.

NCS Technologies has been a Microsoft US OEM Partner of the Year and winner of the Intel Client Solution Innovation Award.

About NCS Technologies, Inc.

NCS Technologies, founded in 1996, builds high quality computing solutions for government, education, enterprise and OEM customers. More than one-half million NCS computing systems have been installed around the world. Visit www.ncst.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2808
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a rel...

CVE-2014-9713
Published: 2015-04-01
The default slapd configuration in the Debian openldap package 2.4.23-3 through 2.4.39-1.1 allows remote authenticated users to modify the user's permissions and other user attributes via unspecified vectors.

CVE-2015-0259
Published: 2015-04-01
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.

CVE-2015-0800
Published: 2015-04-01
The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2...

CVE-2015-0801
Published: 2015-04-01
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.