Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:38 PM
Dark Reading
Dark Reading
Products and Releases

Lenovo Introduces Secure Managed Client Solution 2.0

Remote storage-based solution provides centralized image and user provisioning, secure data storage, redundancy, and single image capability

RESEARCH TRIANGLE PARK, NC " November 17, 2009 " Lenovo today announced Secure Managed Client (SMC) 2.0, the newest version of the PC industry's only storage-based fleet management solution. The latest version of SMC offers IT managers increased security and new manageability tools, while continuing to provide end users with a familiar desktop experience.

Lenovo's SMC 2.0 consists of SMC supported Lenovo ThinkCentre desktop PCs with Intel' vPro Technology, a Lenovo co-developed software stack and centralized Lenovo Storage Array Appliance. This remote storage-based solution offers the benefits of an alternative client solution like centralized image and user provisioning, secure data storage, redundancy and single image capability, without sacrificing the end-user desktop experience by delivering full graphics and audio performance and support for ThinkCentre peripherals such as add-in graphic cards and USB devices.

SMC 2.0 builds on the capabilities of SMC 1.2 in several critical areas including:

Better Security and Storage

* Pristine Image Support1 " An SMC 2.0 enabled PC will return to its original state with each time a user turns off the PC. During this process, SMC 2.0 resets the image on the array to pristine states by removing viruses or malware, temporarily saved information such as files, passwords, and user unique information. This feature makes SMC 2.0 ideal for work settings such as kiosks, libraries and for task workers and software test environments.

* Enhanced Redundancy " In addition to the asynchronous redundancy available in SMC 1.2, SMC 2.0 offers IT managers improved data access by creating duplicate connection managers, allowing end users to continue logging into their desktop PCs even if the original client connection to the SMC Connection Manager in the data center is not available. SMC 2.0 also allows for array synchronous replication2 " a process that instantly backs up user data on separate, redundant storage arrays as soon as user data is saved.

Ease of Management and Improved Manageability

Assigned Seating " IT managers will now be able to choose between assigning an image to a user or a particular SMC client such as a PC located in an office, classroom, hotel lobby or school library. By assigning an image to a specific PC, the PC will always boot directly to a defined Windows image.

* Storage Array Auto Detection " Designed for even the most novice administrator, SMC 2.0 makes managing storage arrays on the network easy with Auto Detect. Once a new storage array has been installed, the SMC 2.0 console automatically detects its presence on the network, minimizing the need to notify the administrator that a new array has been installed.

* Expanded Language Support " On SMC 2.0, Lenovo's user login interface will support additional languages including Scandinavian as well as double byte character set (DBCS) languages such as Chinese, Japanese and Korean.

Enhanced User Experience

* ThinkCentre desktop PCs operating on the SMC 2.0 network can support additional PC add-in cards such as quad monitor graphics, providing users with expandability options. In addition, SMC 2.0 hypervisor automatically delivers higher quality of service for VoIP applications, ideal for call centers or large enterprises that rely heavily on VoIP for phone communications.

"Our customers are asking us for an alternative desktop computing solution that is simple to use, easy to deploy and will deliver a tangible return on investment," said Peter Schrady, vice president, general manager, Software and Peripherals, Lenovo. "The answer is SMC 2.0. We have designed SMC 2.0 to reduce the cost and complexity of desktop virtualization. And best of all, there is no discernible difference to the end user as they work directly from a familiar, full functioning ThinkCentre desktop PC."

Seamless Transition to SMC 2.0

Lenovo offers a suite of Lenovo Professional Services to help customers deploy their solution quickly from initial migration planning to end-to-end SMC implementation. These services include:

* SMC Assessment * Infrastructure Planning & Design * Pilot Deployment * Managed Deployment * Customer Training * SMC Consulting * System Tuning

Customers can also choose Lenovo service and support options including ThinkPlus Priority Support for continuous, 24/7 reliability and efficient operation of the SMC 2.0 solution.

For more information please visit: www.lenovo.com/securemanagedclient.


SMC 2.0 can be deployed on SMC compliant Lenovo ThinkCentre desktop PCs such as the ThinkCentre M58p. The SMC 2.0 solution will be available starting in February 2010 in the US, Canada, Australia, New Zealand and select countries in Europe, Africa and Asia.

About Lenovo

Lenovo (HKSE: 992) (ADR: LNVGY) is dedicated to building exceptionally engineered personal computers. Lenovo's business model is built on innovation, operational efficiency and customer satisfaction as well as a focus on investment in emerging markets. Formed by Lenovo Group's acquisition of the former IBM Personal Computing Division, the company develops, manufactures and markets reliable, high-quality, secure and easy-to-use technology products and services worldwide. Lenovo has major research centers in Yamato, Japan; Beijing, Shanghai and Shenzhen, China; and Raleigh, North Carolina. For more information see www.lenovo.com.

1 Requires fee based software

2 Requires fee based software

3 All offers subject to availability. Lenovo reserves the right to alter product offerings and specifications at any time without notice.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...