Perimeter
2/6/2014
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NCS Technologies Introduces Cirrus LT, Mobile PCoIP Zero Client Laptop Computer

Device uses virtualization approach enhances security

GAINESVILLE, Va., Feb. 4, 2014 /PRNewswire/ -- NCS Technologies, Inc. (www.ncst.com), a leading domestic computing systems manufacturer, today introduced the Cirrus LT PCoIP zero client laptop, a compact notebook that is highly secure and delivers all the functionality of a traditional desktop or laptop computer. The mobile zero client laptop, complete with docking station, battery and Wi-Fi capability, represents a new computing category.

Until today, zero-client computing has been defined as a small, stationary desktop device that has no hard drive, no local storage and no operating system. This device connects a keyboard, monitor and mouse to a data center server. Benefits of this virtualization approach include enhanced security, reduced costs, improved energy efficiency and ease of deployment and administration.

Cirrus LT takes advantage of the strongest security protocols, AES-256 cryptography and NSA Suite B ciphers, when used in conjunction with a PCoIP Remote Workstation Card. It doesn't retain any user data because it doesn't have local storage, hard drive or an operating system. That means secrets won't be compromised if the device is lost, physically broken into or stolen.

The mobile zero client laptop is based on Teradici PCoIP® technology. The PCoIP protocol compresses, encrypts and encodes the entire computing experience at the data center and transmits only pixels across the IP network. Users have fully functional, effortless access to all applications. Cirrus LT can move around an office building or go along on business trips – new with zero client computing.

"Teradici's PCoIP technology was designed to deliver a high performance, secure and easy to manage user experience for virtual desktop and remote workstation users on any device and on any network," said Ziad Lammam, director of product management, Teradici Corporation. "The new Cirrus LT PCoIP zero client laptop combines PCoIP technology and NCS computing innovation to answer the call for a more secure computing capability in today's increasingly mobile environment."

Engineered for low cost of ownership, Cirrus LT is compatible with VMware Horizon View and high-performance PCoIP Remote Workstation environments, delivering a highly efficient IT administrative experience. Cirrus LT supports copper, fiber and Wi-Fi.

"In our research we found a great demand for a secure mobile solution that features the simplicity and performance of a zero client," said Brian Gentry, NCS vice president, engineering. "With Cirrus LT, secure computing now moves to where you need it most – down the hall, at home, or to a hotel thousands of miles away."

"We have determined the key markets for zero client laptops include all government agencies including the military, the intelligence community and education," Gentry said. "We have also identified strong interest from commercial markets including medical/health care, banking and financial services – anywhere where security, mobility and efficiency are critical to doing business."

Cirrus LT Specs

· Teradici PCoIP processor TERA2321

· Storage: No local storage

· Display: 14" HD 16:9 LCD, 1366x768 with anti-glare, LED backlight or 14" HD+ 16:9 LCD, 1600x900 with anti-glare, LED backlight

· Image Performance: 50 Mpps (VDI); 130 Mpps (workstation)

· Networking: Integrated Realtek 10/100/1000Mb Base-TX Ethernet LAN; Ralink 802.11 a/b/g/n 3T3R 450mbps LAN; 100.1000Mb Fiber SFP support in port replicator; wake on LAN and wake on USB support

· Battery: Primary 6-cell Li-Ion smart battery (5,200mAh)

· Dimensions & Weight: 13.375" x 9.25" x 1.125"-1.25"; 3.62 lbs.

Cirrus LT is generally available in the second quarter. For more product information, contact NCS sales at 703-743-8548. See Cirrus LT this month at the AFCEA CyberSpace Symposium, Booth 53a; AFCEA West, Booth 1021; VMware Partner Exchange (PEX), Booth 438; and AUSA, Booth 206. For more information, visit http://www.ncst.com.

NCS Technologies has been a Microsoft US OEM Partner of the Year and winner of the Intel Client Solution Innovation Award.

About NCS Technologies, Inc.

NCS Technologies, founded in 1996, builds high quality computing solutions for government, education, enterprise and OEM customers. More than one-half million NCS computing systems have been installed around the world. Visit www.ncst.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.