Perimeter
2/6/2014
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

NCS Technologies Introduces Cirrus LT, Mobile PCoIP Zero Client Laptop Computer

Device uses virtualization approach enhances security

GAINESVILLE, Va., Feb. 4, 2014 /PRNewswire/ -- NCS Technologies, Inc. (www.ncst.com), a leading domestic computing systems manufacturer, today introduced the Cirrus LT PCoIP zero client laptop, a compact notebook that is highly secure and delivers all the functionality of a traditional desktop or laptop computer. The mobile zero client laptop, complete with docking station, battery and Wi-Fi capability, represents a new computing category.

Until today, zero-client computing has been defined as a small, stationary desktop device that has no hard drive, no local storage and no operating system. This device connects a keyboard, monitor and mouse to a data center server. Benefits of this virtualization approach include enhanced security, reduced costs, improved energy efficiency and ease of deployment and administration.

Cirrus LT takes advantage of the strongest security protocols, AES-256 cryptography and NSA Suite B ciphers, when used in conjunction with a PCoIP Remote Workstation Card. It doesn't retain any user data because it doesn't have local storage, hard drive or an operating system. That means secrets won't be compromised if the device is lost, physically broken into or stolen.

The mobile zero client laptop is based on Teradici PCoIP® technology. The PCoIP protocol compresses, encrypts and encodes the entire computing experience at the data center and transmits only pixels across the IP network. Users have fully functional, effortless access to all applications. Cirrus LT can move around an office building or go along on business trips – new with zero client computing.

"Teradici's PCoIP technology was designed to deliver a high performance, secure and easy to manage user experience for virtual desktop and remote workstation users on any device and on any network," said Ziad Lammam, director of product management, Teradici Corporation. "The new Cirrus LT PCoIP zero client laptop combines PCoIP technology and NCS computing innovation to answer the call for a more secure computing capability in today's increasingly mobile environment."

Engineered for low cost of ownership, Cirrus LT is compatible with VMware Horizon View and high-performance PCoIP Remote Workstation environments, delivering a highly efficient IT administrative experience. Cirrus LT supports copper, fiber and Wi-Fi.

"In our research we found a great demand for a secure mobile solution that features the simplicity and performance of a zero client," said Brian Gentry, NCS vice president, engineering. "With Cirrus LT, secure computing now moves to where you need it most – down the hall, at home, or to a hotel thousands of miles away."

"We have determined the key markets for zero client laptops include all government agencies including the military, the intelligence community and education," Gentry said. "We have also identified strong interest from commercial markets including medical/health care, banking and financial services – anywhere where security, mobility and efficiency are critical to doing business."

Cirrus LT Specs

· Teradici PCoIP processor TERA2321

· Storage: No local storage

· Display: 14" HD 16:9 LCD, 1366x768 with anti-glare, LED backlight or 14" HD+ 16:9 LCD, 1600x900 with anti-glare, LED backlight

· Image Performance: 50 Mpps (VDI); 130 Mpps (workstation)

· Networking: Integrated Realtek 10/100/1000Mb Base-TX Ethernet LAN; Ralink 802.11 a/b/g/n 3T3R 450mbps LAN; 100.1000Mb Fiber SFP support in port replicator; wake on LAN and wake on USB support

· Battery: Primary 6-cell Li-Ion smart battery (5,200mAh)

· Dimensions & Weight: 13.375" x 9.25" x 1.125"-1.25"; 3.62 lbs.

Cirrus LT is generally available in the second quarter. For more product information, contact NCS sales at 703-743-8548. See Cirrus LT this month at the AFCEA CyberSpace Symposium, Booth 53a; AFCEA West, Booth 1021; VMware Partner Exchange (PEX), Booth 438; and AUSA, Booth 206. For more information, visit http://www.ncst.com.

NCS Technologies has been a Microsoft US OEM Partner of the Year and winner of the Intel Client Solution Innovation Award.

About NCS Technologies, Inc.

NCS Technologies, founded in 1996, builds high quality computing solutions for government, education, enterprise and OEM customers. More than one-half million NCS computing systems have been installed around the world. Visit www.ncst.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?