Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:45 AM

Thin's Back In

Thin clients, that is, and not just because they're cheaper and more eco-friendly - they're also more secure

Since last decade when I first became aware of a company called Clear Cube that pioneered the use of server blade technology for the desktop, I've been pointing to this as a possible future migration path.

In the emerging Web 2.0 world of hosted applications and services, the idea of a fully hosted desktop experience has been gaining momentum and support. Much of the focus has been on thin-client deployments driven by companies like Wyse, HP, and Neoware. With the spread of wireless broadband and WiMax on the horizon we've even seen the emergence of thin-client laptops like the MaxBook 810, Itona Gio and Xpe, and Neoware m100.

Use of both traditional thin clients and blades is growing, due largely to the fact that they eliminate many performance and cost disadvantages, while reducing concerns over uptime, power consumption, and security.

Because we focus on security here at Dark Reading and because I have a personal passion for energy conservation we'll touch on those two points in this piece.

Where Security's King, Traditional PCs Are Toast
This last year we've seen a number of embarrassing laptop thefts, each with lots of potential to damage an organization's business or good name. Under current rules these thefts (or losses) must be disclosed. And affected customers or partners don't appear to be cutting anyone much slack when it comes to lost, confidential information.

With the increasing possibility that lost data will result in civil and possibly even criminal charges, IT professionals are rightfully concerned that PCs are simply not secure enough.

Of course, a big part of the problem has been the lack of decent user authentication. OEMs have put biometric readers on laptops for some time and third parties like SanDisk have created convenient USB biometric devices, but they are often not used or are left non-configured. And in the case of a stolen laptop, biometric readers may not eliminate the need to report the theft even if the data remains encrypted and secure.

The only sure way to prevent exposure is to make sure the client device doesn't contain any data in the first place. Combined with adequate user authentication (otherwise the networked device is like an unprotected master key), a stolen thin client device has very little value.

Case in point: I recently learned about a number of thin-client devices that were stolen from offices in India. Unremarkable, except they were quietly returned after the thief discovered there wasn't much demand for empty devices on the black market.

Blades vs. Traditional Thin Clients
Thin-client computers are tied to a shared server resource and they are typically both I/O- and processor-bound. This makes them inadequate for most individuals used to traditional, that is, faster PC performance. However, they are more than adequate for data entry, many call-center applications, and for many attendants and systems administrators (who typically are working on remote systems anyway).

PC and workstation blades provide a comparable level of performance to a normal PC or workstation when coupled with a strong systems management product. The blades also provide a level of uptime and redundancy that traditional PC deployments can't touch. That is why you typically see this in healthcare, on trading floors, and in some scientific implementations.

Environmental Considerations
Blades and traditional thin clients have strong environmental benefits as well. They consume fewer resources and they typically both take up less space when disposed of and have fewer toxic metals. Much of the large physical structure for cooling and containing the blades is reusable and can remain in service for decades. Finally, because both the blades and the servers are centrally located, low-cost cooling solutions, like piped-in cool water, can be used where they wouldn't otherwise be practical.

Secondary benefits include reduction of heat and noise pollution in the workspace, along with the need to use costly engineering to remove or eliminate these problems. This too saves resources.

Both blades and thin clients have reached a level of maturity that, while they still aren't applicable for everyone, are superior solutions when security, noise, heat, and/or uptime are critical to your business.

Rob Enderle is President and Founder of Enderle Group . Special to Dark Reading

  • Clear Cube
  • Hewlett-Packard Co. (NYSE: HPQ)
  • Neoware Systems Inc.
  • SanDisk Corp. (Nasdaq: SNDK)
  • Wyse Technology

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Threaded  |  Newest First  |  Oldest First
    How to Better Secure Your Microsoft 365 Environment
    Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
    Attackers Leave Stolen Credentials Searchable on Google
    Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2020: The Year in Security
    Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
    Flash Poll
    Assessing Cybersecurity Risk in Today's Enterprises
    Assessing Cybersecurity Risk in Today's Enterprises
    COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2021-01-27
    WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
    PUBLISHED: 2021-01-27
    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
    PUBLISHED: 2021-01-27
    A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to
    PUBLISHED: 2021-01-27
    Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to
    PUBLISHED: 2021-01-27
    Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to