Perimeter
2/6/2014
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NCS Technologies Introduces Cirrus LT, Mobile PCoIP Zero Client Laptop Computer

Device uses virtualization approach enhances security

GAINESVILLE, Va., Feb. 4, 2014 /PRNewswire/ -- NCS Technologies, Inc. (www.ncst.com), a leading domestic computing systems manufacturer, today introduced the Cirrus LT PCoIP zero client laptop, a compact notebook that is highly secure and delivers all the functionality of a traditional desktop or laptop computer. The mobile zero client laptop, complete with docking station, battery and Wi-Fi capability, represents a new computing category.

Until today, zero-client computing has been defined as a small, stationary desktop device that has no hard drive, no local storage and no operating system. This device connects a keyboard, monitor and mouse to a data center server. Benefits of this virtualization approach include enhanced security, reduced costs, improved energy efficiency and ease of deployment and administration.

Cirrus LT takes advantage of the strongest security protocols, AES-256 cryptography and NSA Suite B ciphers, when used in conjunction with a PCoIP Remote Workstation Card. It doesn't retain any user data because it doesn't have local storage, hard drive or an operating system. That means secrets won't be compromised if the device is lost, physically broken into or stolen.

The mobile zero client laptop is based on Teradici PCoIP® technology. The PCoIP protocol compresses, encrypts and encodes the entire computing experience at the data center and transmits only pixels across the IP network. Users have fully functional, effortless access to all applications. Cirrus LT can move around an office building or go along on business trips – new with zero client computing.

"Teradici's PCoIP technology was designed to deliver a high performance, secure and easy to manage user experience for virtual desktop and remote workstation users on any device and on any network," said Ziad Lammam, director of product management, Teradici Corporation. "The new Cirrus LT PCoIP zero client laptop combines PCoIP technology and NCS computing innovation to answer the call for a more secure computing capability in today's increasingly mobile environment."

Engineered for low cost of ownership, Cirrus LT is compatible with VMware Horizon View and high-performance PCoIP Remote Workstation environments, delivering a highly efficient IT administrative experience. Cirrus LT supports copper, fiber and Wi-Fi.

"In our research we found a great demand for a secure mobile solution that features the simplicity and performance of a zero client," said Brian Gentry, NCS vice president, engineering. "With Cirrus LT, secure computing now moves to where you need it most – down the hall, at home, or to a hotel thousands of miles away."

"We have determined the key markets for zero client laptops include all government agencies including the military, the intelligence community and education," Gentry said. "We have also identified strong interest from commercial markets including medical/health care, banking and financial services – anywhere where security, mobility and efficiency are critical to doing business."

Cirrus LT Specs

· Teradici PCoIP processor TERA2321

· Storage: No local storage

· Display: 14" HD 16:9 LCD, 1366x768 with anti-glare, LED backlight or 14" HD+ 16:9 LCD, 1600x900 with anti-glare, LED backlight

· Image Performance: 50 Mpps (VDI); 130 Mpps (workstation)

· Networking: Integrated Realtek 10/100/1000Mb Base-TX Ethernet LAN; Ralink 802.11 a/b/g/n 3T3R 450mbps LAN; 100.1000Mb Fiber SFP support in port replicator; wake on LAN and wake on USB support

· Battery: Primary 6-cell Li-Ion smart battery (5,200mAh)

· Dimensions & Weight: 13.375" x 9.25" x 1.125"-1.25"; 3.62 lbs.

Cirrus LT is generally available in the second quarter. For more product information, contact NCS sales at 703-743-8548. See Cirrus LT this month at the AFCEA CyberSpace Symposium, Booth 53a; AFCEA West, Booth 1021; VMware Partner Exchange (PEX), Booth 438; and AUSA, Booth 206. For more information, visit http://www.ncst.com.

NCS Technologies has been a Microsoft US OEM Partner of the Year and winner of the Intel Client Solution Innovation Award.

About NCS Technologies, Inc.

NCS Technologies, founded in 1996, builds high quality computing solutions for government, education, enterprise and OEM customers. More than one-half million NCS computing systems have been installed around the world. Visit www.ncst.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1701
Published: 2015-04-21
Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015.

CVE-2015-2041
Published: 2015-04-21
net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-2042
Published: 2015-04-21
net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.

CVE-2015-0702
Published: 2015-04-20
Unrestricted file upload vulnerability in the Custom Prompts upload implementation in Cisco Unified MeetingPlace 8.6(1.9) allows remote authenticated users to execute arbitrary code by using the languageShortName parameter to upload a file that provides shell access, aka Bug ID CSCus95712.

CVE-2015-0703
Published: 2015-04-20
Cross-site scripting (XSS) vulnerability in the administrative web interface in Cisco Unified MeetingPlace 8.6(1.9) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus95857.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.