SlideShare a Scribd company logo
Eugrid SecureClient and Mobile Option
           Thin Client that Utilizes Existing Computers without Modification

1. Present Situation
   Leakage of personal information continues to pose a problem in all ages. Just
recently, a foreign engineer working as a permanent staff at a manufacturing company
tried to take out a large amount of highly confidential technical information and take it
back to his home country. The exposure of this incident appalled the manufacturing
industry.
   As you can see from this incident, the risk of information leakage is increasing more
than ever in every corner of the society.
   Although the thin client system, either server-based, blade or remote-boot, is one of
the ideal solutions that protects intentional leakage of information, there are several
defects such as:


       •    The cost of installation including necessary hardware is highly expensive.
       •    Existing computers become unnecessary.
       •    Lacks flexibility as the security level is difficult to adjust according to the
            change of situation.
 
2. Problems and Objectives
  To prevent information leakage from a large number of PC already installed in a
company is not an issue limited to special sectors such as financial institutes. It is a
social issue that intimidates all types of companies. Therefore, the introduction of a
security solution equivalent to the current thin client that can readily be installed in
ordinary companies at lower cost has been aspired.
  Eugrid SecureClient was developed to provide high security to a wide range of
sectors including ordinary companies and schools without a large amount of
investment. Another objective of the development was to increase the security of
mobile computers to the level equivalent to that of thin client, which was impossible
with the conventional technology.

3. Difference with Conventional Technology
   The conventional thin-client solution is a highly expensive solution as it requires the
installation of new hardware. It was therefore installed by only some companies where
security is a primary issue, such as banks and financial institutions, which can invest a
large amount of funds.
                                       E GRI e u e l n
                                        U  DS c rCi t
                                                    e
   Eugrid SecureClient
utilizes        ordinary       No need               Data & Environm ents
                                                                ronm ents
                                                                            C enter
                                                     D ata & Envi           Functi i es
                                                                                  onalti
computers     and     file     new Severs
servers     that     are
                                                      O S, A ppli on
                                                                i on
                                                                cati
                                                      O S, A pplcati
currently being used                  Data            Softw ares
                                                      Softw ares
without    having       to
make                 any                                                    C lent
                                                                               i
                                                      C PU and Hardw are
                                                      CPU and Hardw are     Functi i es
                                                                                   onalti
modification.            It     Exi ng PC
                                  sti
realizes a simulated
                              Continue to use         Displ & K eyboard
                                                      Di ay & K eyboard
                                                        splay



                                                                                            1
security level equivalent to that of the thin client by imposing software restrictions to
enhance security of the existing hardware resources.

   The most important restriction feature that forms the basis of Eugrid SecureClient is
the write-protect feature that nothing leaves traceable information of user data in the
internal disk of the computer. This restriction will always be active when the computer is
connected to the internal LAN, WAN or when using USB flash drives outside the
company. Windows and all the other applications that have been used on the computer
will remain installed on the internal hard disk, and can be started from the internal hard
disk as before.
   “Information that does not exist cannot be leaked” – this principle of thin client is
realized by preventing information from being saved under the control of the user.


     1.   Writing on to the internal hard disk of the computer is restricted.
     2.   While the use of Desktop and My Document area is authorized to the users
          and applications without restriction, the actual information is stored
          automatically in the center-controlled server.

  This virtualized redirection feature is activated dynamically when the user logs on,
and deactivated at the logoff. No footprint including the information itself and the
access path will remain on the computer. As a result, there is no information on the
computer that can be leaked.

  As the result, Eugrid SecureCliet doesn’t need any server resources in the data
center except storage devices. This can give great merit to the company.




                                                                                        2
Current thin client solution                                            Eugrid SecureClient



                               File Server                                                        File Server



                                                                                                                Full employ
                                                                                                                P ’s C U
                                                                                                                 C     P


                                                                                N need Servers
                                                                                 o



                                                VPN                                                                 VPN




                                              D t
                                               aa                P 、 S、 pplications
                                                                CU O A




  However, this feature alone will allow leakage if the data is opened using the
application and stored in an external storage media. Following restriction features are
mounted to prevent such leakage.
  It is also possible to place limitations such as restricting unnecessary modification of
settings or prohibiting printing.


      1.       Restrict the use of external storage media such as USB flash drive, FD and
               DVD
      2.       Prohibit printing
      3.       Restrict the use of original Windows features that allow selection from the
               Start menu, etc.
      4.       Restrict startup of applications installed in the computer
      5.       Restrict network connection

                                             Synchroni ng w i O U of A D
                                                     zi     th


  Si plfi Secure
   m i ed&                                                                                       Usabii Effi ency
                                                                                                      lty& ci




       Cal Center O perators
         l                                           Part ti e w orkers
                                                           m                              R egal Em pl
                                                                                                     oyees

           4                   2                                            2                                        2
                                                 3                                    3
       3
                               1                                            1                                        1


                     1.M em ory M edi
                                    a          2. Pri
                                                    nter      3. Wid wsU
                                                                  no    I 4. A pplcati
                                                                                 i ons                                        3
These features operate with Microsoft’s Active Directory (referred to as AD
hereafter), which is a tool that controls the users centrally and allows the above
restriction conditions to be set according to each organization unit (OU).
   The above settings can be modified any time by the administrator according to the
location, authorization level of the user and the information to be handled. Unlike the
rigid structure of the conventional thin client, it is possible to optimize the security level
while considering the convenience of the user.




                                                                                            4
4. Advantages of User
   While the user can use the existing computer with the same convenience as before,
all the information belonging to the user will be stored in the central server. Such
information will be dynamically accessible from the computer when the user logs on
and become completely detached from the computer when the user logs off.

  In other words, unlike conventional computers, the relationship between the
computer and the user is detached and independent.
   
  The user will have the following advantages:


      1.    The same computer can be shared by multiple users thereby promoting the
            effective use of the computer and decreasing the number of necessary
            computers.
      2.    Shared computers placed in meeting rooms, etc., can be used under your
            own system environment. Users can use the computer placed anywhere as
            your own computer.
      3.    Even if the computer breaks down, you can replace it and immediately
            restore it to provide your own system environment without interrupting
            business.
      4.    There is no need to delete data when disposing computers thereby reducing
            administrative cost and lowering risk of leakage.
      5.    When converting the existing system environment into thin client, the
            information inside the computer is automatically transferred so that
            installation and conversion costs can be kept to minimum.

5. Data free working environment
  When using this solution, the control center administers all the data inside the all
computers, therefore assuming the role of a powerful infrastructure that supports IT
Governance and SOX compliance.

                   C
                  P environment                              IDC

           D free w
            ata    orking space                      Centralized Data
                                                       Manag ent
                                                              em
       Offshore      Home      Headquarter               All PC data

            VPN           LAN/WAN




                                                   Enterprise backup,
           User can use normal PC as is
                                                  Monitoring and Control



                                                                                    5
6. Mobile Option
  Laptop computer is an important tool for corporations to enhance customer service
and to accelerate business speed. However, it entails high risk of information leakage
and the consequence, if information is leaked from the computer, is enormous.
  Conventional thin-client solutions, regardless of the method, require network
connection, and there is a large gap between the needs of the users that seek to use
their computer anywhere they want.

  Eugrid SecureClient’s Mobile option allows safe use of computer outside the
company even when network connection is unavailable. This is possible because the
system environment of the user as well as necessary operation information of the user
that are stored in the file server of the control center can be taken out as a unit using
the USB flash device, and the device can be connected to the computer and used
anywhere.

   The restriction conditions for outside usage set by the information administrator will
be applied so that the data taken out is guaranteed to be handled under the
environment intended by the information administrator.
   The aforementioned feature of Eugrid SecureClient that leaves no footprint in the
computer also applies to the mobile option as all the information is stored in the USB
flash device.
   Therefore, as long as you do not carry both the USB flash device and the laptop in
the same bag, there will be no risk of information leakage even if the laptop is stolen or
lost, as there is no information stored inside.



                                                                                        Out side of Company
    Inside of Company




                                                                              Outside
                        Policy




                                                                               Policy
                        Inside




                                 I
                                 nternal R ul
                                            e      Sw i
                                                      tch     External R ul
                                                                          e



                                                No footpri
                                                         nt
                                                No Data



  The USB flash drive is encoded with 256 bit AES. In addition, our unique security
provides an additional feature that forces the “reformat” dialog to appear on the display
when the stolen or lost USB flash drive is connected to the computer of the finder. The
USB flash drive, therefore cannot be used unless it is reformatted.

  Consequently, the information stored in the stolen or lost USB flash drive will be
deleted before it can be accessed.




                                                                                                              6
7. Mobile Option Merits
  This mobile solution consists of a combination of the server located in a secure area
within the company and the USB flash drive. This combination realizes unprecedented
security in mobile usage.

    1.   There will be no risk of information leakage as no footprint will be left in the
         laptop computer used outside the company.
    2.   The USB flash device, which stores user data and system environment as a
         set, can be connected to any computer installed with Eugrid SecureClient
         client software. The user’s own system environment will be restored upon
         logon.
    3.   Severe policy, independent of the policy inside the company, can be applied
         for usage outside the company.
    4.   The data taken out in the USB flash device will always remain original data on
         the server inside the company, so that you can keep track of the exact content
         of the information in case the USB flash device is lost or stolen.
    5.   The log data of the client computer inside and outside the company will be
         compiled on the server.
    6.   Information stored in the USB flash device will be deleted before it can be
         accessed if it is used in an inappropriate way.




                                                                                       7

More Related Content

PDF
Increasing Throughput per Node for Content Delivery Networks
PDF
860 dspi firmware_upgrade_instructions_app_note
PDF
2018 Intel AI Developer Conference Keynote
PDF
Uss Overview Adira
DOC
Wipro - FM Best Practices Showcase
PDF
Cots moves to multicore: Wind River
PDF
3 additional dpdk_theory(1)
PDF
Motorola ptp 800 series 04 10 user guide
Increasing Throughput per Node for Content Delivery Networks
860 dspi firmware_upgrade_instructions_app_note
2018 Intel AI Developer Conference Keynote
Uss Overview Adira
Wipro - FM Best Practices Showcase
Cots moves to multicore: Wind River
3 additional dpdk_theory(1)
Motorola ptp 800 series 04 10 user guide

What's hot (10)

PPTX
Data center Technologies
 
PDF
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
PDF
Ne40 hardware-description
PDF
Tool support for semi-automatic modularization of existing code bases
PDF
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
PDF
101 cd 1345-1415
PDF
102 1630 1700
PDF
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
 
PDF
Embedded Solutions 2010: Intel Multicore by Eastronics
PDF
Cell management (e ran3.0 05)
Data center Technologies
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
Ne40 hardware-description
Tool support for semi-automatic modularization of existing code bases
Embedding Existing Heterogeneous Monitoring Techniques into a Lightweight, Di...
101 cd 1345-1415
102 1630 1700
Greenplum Analytics Workbench - What Can a Private Hadoop Cloud Do For You?
 
Embedded Solutions 2010: Intel Multicore by Eastronics
Cell management (e ran3.0 05)
Ad

Similar to Serverless Thin Client (20)

PDF
PowerPro Flyer English
PDF
Cumulus Networks & Puppet Labs webinar
PDF
Basic LAN types
PDF
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
PDF
Secure Delivery Center, Eclipse Open Source
PDF
Remotely Scanning Organization’s Internal Network
PPTX
How to Operate Kubernetes CI/CD Pipelines at Scale
PDF
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
PPTX
Acceleration_and_Security_draft_v2
PPTX
Track2 -刘希斌----c ie-net-openstack-2012-apac
PPTX
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
PDF
DevicePro Flyer English
PDF
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
PDF
Firstcomm construction of a DR plan
PDF
Firstcomm construction of a DR plan
PDF
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
PDF
Challenges in Assessing Single Event Upset Impact on Processor Systems
PDF
Owny IT Desktop Monitoring Featurelist
PPTX
PPTX
OpenStack Summit Portland April 2013 talk - Quantum and EC2
PowerPro Flyer English
Cumulus Networks & Puppet Labs webinar
Basic LAN types
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Secure Delivery Center, Eclipse Open Source
Remotely Scanning Organization’s Internal Network
How to Operate Kubernetes CI/CD Pipelines at Scale
ITPROCEED_WorkplaceMobility_Creating a seamless experience with ue v and wind...
Acceleration_and_Security_draft_v2
Track2 -刘希斌----c ie-net-openstack-2012-apac
5 Tips for Using TIA Portal V14 to Decrease Safety Development Time
DevicePro Flyer English
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
Firstcomm construction of a DR plan
Firstcomm construction of a DR plan
Scalable TensorFlow Deep Learning as a Service with Docker, OpenPOWER, and GPUs
Challenges in Assessing Single Event Upset Impact on Processor Systems
Owny IT Desktop Monitoring Featurelist
OpenStack Summit Portland April 2013 talk - Quantum and EC2
Ad

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
TLE Review Electricity (Electricity).pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
1. Introduction to Computer Programming.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
August Patch Tuesday
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
DP Operators-handbook-extract for the Mautical Institute
Univ-Connecticut-ChatGPT-Presentaion.pdf
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
TLE Review Electricity (Electricity).pptx
WOOl fibre morphology and structure.pdf for textiles
A comparative analysis of optical character recognition models for extracting...
Group 1 Presentation -Planning and Decision Making .pptx
cloud_computing_Infrastucture_as_cloud_p
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Getting Started with Data Integration: FME Form 101
1. Introduction to Computer Programming.pptx
Hindi spoken digit analysis for native and non-native speakers
August Patch Tuesday
Programs and apps: productivity, graphics, security and other tools
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
MIND Revenue Release Quarter 2 2025 Press Release
DP Operators-handbook-extract for the Mautical Institute

Serverless Thin Client

  • 1. Eugrid SecureClient and Mobile Option Thin Client that Utilizes Existing Computers without Modification 1. Present Situation Leakage of personal information continues to pose a problem in all ages. Just recently, a foreign engineer working as a permanent staff at a manufacturing company tried to take out a large amount of highly confidential technical information and take it back to his home country. The exposure of this incident appalled the manufacturing industry. As you can see from this incident, the risk of information leakage is increasing more than ever in every corner of the society. Although the thin client system, either server-based, blade or remote-boot, is one of the ideal solutions that protects intentional leakage of information, there are several defects such as: • The cost of installation including necessary hardware is highly expensive. • Existing computers become unnecessary. • Lacks flexibility as the security level is difficult to adjust according to the change of situation.   2. Problems and Objectives To prevent information leakage from a large number of PC already installed in a company is not an issue limited to special sectors such as financial institutes. It is a social issue that intimidates all types of companies. Therefore, the introduction of a security solution equivalent to the current thin client that can readily be installed in ordinary companies at lower cost has been aspired. Eugrid SecureClient was developed to provide high security to a wide range of sectors including ordinary companies and schools without a large amount of investment. Another objective of the development was to increase the security of mobile computers to the level equivalent to that of thin client, which was impossible with the conventional technology. 3. Difference with Conventional Technology The conventional thin-client solution is a highly expensive solution as it requires the installation of new hardware. It was therefore installed by only some companies where security is a primary issue, such as banks and financial institutions, which can invest a large amount of funds. E GRI e u e l n U DS c rCi t e Eugrid SecureClient utilizes ordinary No need Data & Environm ents ronm ents C enter D ata & Envi Functi i es onalti computers and file new Severs servers that are O S, A ppli on i on cati O S, A pplcati currently being used Data Softw ares Softw ares without having to make any C lent i C PU and Hardw are CPU and Hardw are Functi i es onalti modification. It Exi ng PC sti realizes a simulated Continue to use Displ & K eyboard Di ay & K eyboard splay 1
  • 2. security level equivalent to that of the thin client by imposing software restrictions to enhance security of the existing hardware resources. The most important restriction feature that forms the basis of Eugrid SecureClient is the write-protect feature that nothing leaves traceable information of user data in the internal disk of the computer. This restriction will always be active when the computer is connected to the internal LAN, WAN or when using USB flash drives outside the company. Windows and all the other applications that have been used on the computer will remain installed on the internal hard disk, and can be started from the internal hard disk as before. “Information that does not exist cannot be leaked” – this principle of thin client is realized by preventing information from being saved under the control of the user. 1. Writing on to the internal hard disk of the computer is restricted. 2. While the use of Desktop and My Document area is authorized to the users and applications without restriction, the actual information is stored automatically in the center-controlled server. This virtualized redirection feature is activated dynamically when the user logs on, and deactivated at the logoff. No footprint including the information itself and the access path will remain on the computer. As a result, there is no information on the computer that can be leaked. As the result, Eugrid SecureCliet doesn’t need any server resources in the data center except storage devices. This can give great merit to the company. 2
  • 3. Current thin client solution Eugrid SecureClient File Server File Server Full employ P ’s C U C P N need Servers o VPN VPN D t aa P 、 S、 pplications CU O A However, this feature alone will allow leakage if the data is opened using the application and stored in an external storage media. Following restriction features are mounted to prevent such leakage. It is also possible to place limitations such as restricting unnecessary modification of settings or prohibiting printing. 1. Restrict the use of external storage media such as USB flash drive, FD and DVD 2. Prohibit printing 3. Restrict the use of original Windows features that allow selection from the Start menu, etc. 4. Restrict startup of applications installed in the computer 5. Restrict network connection Synchroni ng w i O U of A D zi th Si plfi Secure m i ed& Usabii Effi ency lty& ci Cal Center O perators l Part ti e w orkers m R egal Em pl oyees 4 2 2 2 3 3 3 1 1 1 1.M em ory M edi a 2. Pri nter 3. Wid wsU no I 4. A pplcati i ons 3
  • 4. These features operate with Microsoft’s Active Directory (referred to as AD hereafter), which is a tool that controls the users centrally and allows the above restriction conditions to be set according to each organization unit (OU). The above settings can be modified any time by the administrator according to the location, authorization level of the user and the information to be handled. Unlike the rigid structure of the conventional thin client, it is possible to optimize the security level while considering the convenience of the user. 4
  • 5. 4. Advantages of User While the user can use the existing computer with the same convenience as before, all the information belonging to the user will be stored in the central server. Such information will be dynamically accessible from the computer when the user logs on and become completely detached from the computer when the user logs off. In other words, unlike conventional computers, the relationship between the computer and the user is detached and independent.   The user will have the following advantages: 1. The same computer can be shared by multiple users thereby promoting the effective use of the computer and decreasing the number of necessary computers. 2. Shared computers placed in meeting rooms, etc., can be used under your own system environment. Users can use the computer placed anywhere as your own computer. 3. Even if the computer breaks down, you can replace it and immediately restore it to provide your own system environment without interrupting business. 4. There is no need to delete data when disposing computers thereby reducing administrative cost and lowering risk of leakage. 5. When converting the existing system environment into thin client, the information inside the computer is automatically transferred so that installation and conversion costs can be kept to minimum. 5. Data free working environment When using this solution, the control center administers all the data inside the all computers, therefore assuming the role of a powerful infrastructure that supports IT Governance and SOX compliance. C P environment IDC D free w ata orking space Centralized Data Manag ent em Offshore Home Headquarter All PC data VPN LAN/WAN Enterprise backup, User can use normal PC as is Monitoring and Control 5
  • 6. 6. Mobile Option Laptop computer is an important tool for corporations to enhance customer service and to accelerate business speed. However, it entails high risk of information leakage and the consequence, if information is leaked from the computer, is enormous. Conventional thin-client solutions, regardless of the method, require network connection, and there is a large gap between the needs of the users that seek to use their computer anywhere they want. Eugrid SecureClient’s Mobile option allows safe use of computer outside the company even when network connection is unavailable. This is possible because the system environment of the user as well as necessary operation information of the user that are stored in the file server of the control center can be taken out as a unit using the USB flash device, and the device can be connected to the computer and used anywhere. The restriction conditions for outside usage set by the information administrator will be applied so that the data taken out is guaranteed to be handled under the environment intended by the information administrator. The aforementioned feature of Eugrid SecureClient that leaves no footprint in the computer also applies to the mobile option as all the information is stored in the USB flash device. Therefore, as long as you do not carry both the USB flash device and the laptop in the same bag, there will be no risk of information leakage even if the laptop is stolen or lost, as there is no information stored inside. Out side of Company Inside of Company Outside Policy Policy Inside I nternal R ul e Sw i tch External R ul e No footpri nt No Data The USB flash drive is encoded with 256 bit AES. In addition, our unique security provides an additional feature that forces the “reformat” dialog to appear on the display when the stolen or lost USB flash drive is connected to the computer of the finder. The USB flash drive, therefore cannot be used unless it is reformatted. Consequently, the information stored in the stolen or lost USB flash drive will be deleted before it can be accessed. 6
  • 7. 7. Mobile Option Merits This mobile solution consists of a combination of the server located in a secure area within the company and the USB flash drive. This combination realizes unprecedented security in mobile usage. 1. There will be no risk of information leakage as no footprint will be left in the laptop computer used outside the company. 2. The USB flash device, which stores user data and system environment as a set, can be connected to any computer installed with Eugrid SecureClient client software. The user’s own system environment will be restored upon logon. 3. Severe policy, independent of the policy inside the company, can be applied for usage outside the company. 4. The data taken out in the USB flash device will always remain original data on the server inside the company, so that you can keep track of the exact content of the information in case the USB flash device is lost or stolen. 5. The log data of the client computer inside and outside the company will be compiled on the server. 6. Information stored in the USB flash device will be deleted before it can be accessed if it is used in an inappropriate way. 7