Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients
|
|
|
- Judith Allen
- 9 years ago
- Views:
Transcription
1 Hp Compaq t5000 Thin Clients June 2004 Instructions. Thin Client Virus Vulnerability Analysis HP Compaq t5000 Thin Clients Table Of Contents Table Of Contents... 1 Executive Summary... 2 Virus Vulnerabilities, Encounters and Impact... 3 Virus Encounter Vectors... 3 Impact of Client Computing Vulnerabilities... 4 HP Thin Client Response to Vulnerabilities... 5 Thin Client Firewall... 8 Recovery Time... 8 Summary
2 Executive Summary Enterprise computing networks require effective protection against computer viruses and other security issues. These security breaches can result in costly service calls, user downtime and loss of business-critical data. When compared to the traditional unmanaged PC network model, the HP thin client computing model yields a less vulnerable segregated approach to computing with substantially better recovery time, while minimizing total cost of ownership (TCO). According to an ICSA Labs virus analysis 1, the average downtime lost during an encounter was 23 person days. This down time accounted for data loss recovery and patching the connected network servers and PCs. With the HP thin client computing model, your exposure to virus attack on the thin client system is over 80% less than a standard Windows PC. This means that your user will experience significantly less downtime due to security vulnerabilities than a PC user. In addition, since no user data resides on the thin client, there is no risk of user data loss on the thin client. Finally, if a thin client s image is compromised or corrupted, the recovery time is typically measured in minutes instead of hours. Furthermore, the HP thin client computing model utilizes PC blades and/or servers located in the data center. These centralized devices can be protected and monitored more easily with centrally managed virus and firewall tools. Compromised resources can be quickly taken offline, corrected, or recovered faster and cheaper than distributed PC resources. This model also allows a user s data to be segregated and centralized for easy backup and recovery, ensuring a higher level of service and security for your users at a lower TCO than distributed PC resources. At HP, we realize security and TCO are important factors in enterprise computing. A Fall 2003 EDC survey showed more than eight out of every 10 enterprises suffered a security breach as a result of malicious code. As a result, more than half the enterprises are increasing their IT security budgets. HP believes the thin client computing model is an effective solution for the security conscious enterprise. 1 ICSA Labs 8 th Annual Computer Virus Prevalence Survey 2
3 Virus Vulnerabilities, Encounters and Impact The following graph depicts security vulnerabilities experienced by actual enterprise customers as surveyed by ICSA Labs for the years 1996 through The second graph contains the most vulnerable technologies as perceived by the enterprises surveyed in 2003 by EDC. The graphs illustrate a strong correlation between the actual occurrence of each vulnerability and its associated technology in an enterprise. For example, 86% of the encounters experienced in 2002 were related and according to EDC, 50% of the enterprises surveyed in 2003 perceive as their most vulnerable technology. The third graph illustrates the impact of these vulnerabilities on the enterprises surveyed by ICSA in % Virus Encounter Vectors ICSA Labs Virus Prevalence Survey % 80% 70% 60% 50% 40% 30% 20% 10% 0% Diskette Internet/Non- Other Note: Other in this graph represents unknown vectors and 3 rd party/freeware software distribution 3
4 Impact of Client Computing Vulnerabilities Responses Loss of productivity 75% PC was unavailable 69% Corrupted files 62% Loss of access to data 49% Lost data 47% Effects Loss of user confidence Interference, lockup Unreliable applications 18% 13% 33% Trouble reading files 12% Trouble saving files 9% System crash 9% Trouble printing 7% Threat of job loss 2% ICSA Labs Virus Prevalence Survey
5 HP Thin Client Response to Vulnerabilities Given the data in the previous section, the thin client computing model substantially reduces the likelihood that the client device will encounter a vulnerability as compared to a standard PC. It also centralizes an enterprise s most vulnerable technologies in the data center where they can be most effectively controlled and protected from exposure at the user level. The following table summarizes the previous data and shows that thin clients are substantially less susceptible to the virus vectors and are exposed to fewer of the perceived vulnerable technologies than a standard PC. The following sections detail these areas as related to the thin client computing model. Technology Personal Computers (PC) Thin Client (TC) Diskette/Removable Media 2002 Encounter Vector Experienced Perceived Vulnerability Encounter Vector Experienced 2 86% 49.9% 0% 0% Operating System Instant Messaging 2003 Perceived Vulnerability 3 0% 13.5% 0% 13.5% 0% 10.1% 0% 4 0% 4 Web Browser 4% 8.1% 0% 4 0% 4 Peer-to-Peer Apps Office Applications Multimedia Viewers 11% 6% 0% 0% 0% 6% 0% 0% 0% 3.6% 0%4 0% 4 Other 5 4% 2.9% 0% 0% Total 105% 100% 0% 13.5% The intrusion of viruses from diskettes has declined significantly over the years and does not appear to be a significant vulnerability point. Still, a small percentage of virus encounters do occur via CD-ROMs and other removable media, typically when infected retail software is installed. Thin clients are predominantly deployed with no local removable drives such as CD-ROMs, diskettes, or hard drives. 2 ICSA Labs Virus Prevalence Survey Enterprise Development Mgt. Issues 2003: Fall, 2003 Evans Data Corp. 4 This vulnerability is zero only if this component is not installed on the thin client device 5 Other in this table represents unknown vectors and 3 rd party/freeware software distribution 5
6 /Office applications Web Browser/Internet/Non /Peer-to-Peer With thin clients, users execute their and office productivity applications on centralized servers and/or blade PCs. These applications and their associated data execute only on the server/blade. The user interface for these applications is rendered locally on the thin client through the Terminal Services Remote Desktop Protocol (RDP) or the Citrix Independent Computing Architecture (ICA ) protocol. This means any virus or vulnerability introduced through your /office or other remote applications typically affect the server/blade and not the thin client. Additionally, the administrator has total control over the crucial applications and data on the servers or blade PCs, and can readily manage and deploy virus and firewall protection to these centralized systems. While these backend systems are at risk, applying patches or hot-fixes to centralized computing resources is more cost effective and takes less time than it does for standalone PC systems. These vectors and technologies are a growing concern. The majority of infection occurs through infected/malicious code that is downloaded or shared via these technologies. Security holes in internet browsers are reported frequently. Browser-related intrusions are centered on JavaScript, Java Applets and Active X. The thin client model addresses these exposures in several ways. First, peer-to-peer applications and many of the internet and non- web services are typically not deployed on thin clients. The best thin client strategy is to deploy only what you need to achieve your business goals. Second, user initiated file downloads and sharing typically occur at the server/blade PC level and not on the thin client itself. The thin client typically does not provide the user with the space and access rights to support this. For example, on HP XPe thin clients, the Enhanced Write Filter (EWF) prevents permanent modifications (writes) to the contents of the system s flash. Finally, the internet browser is an optional feature on the HP thin clients. It can be removed to ensure a more secure environment. 6
7 Operating System Compared to a standard PC operating system, embedded operating systems are substantially smaller, providing less surface area to attack. Also, it is usually easier to configure an embedded OS to have fewer services that can be exploited than it is for a standard operating system. Advantages of the operating system will differ based upon the embedded OS chosen. Different operating systems are targeted at different rates and inherently have unique vulnerabilities. For example, CE.NET is substantially smaller and lighter than XPe or XP and is not targeted aggressively. The following is a comparison of operating systems and their exposure on HP systems to the most exploited vulnerabilities of 2003 as listed by TruSecure. 6 As compared to a standard Windows PC, only two (MS and MS03-007) or around 22% these nine most exploited vulnerabilities were relevant to the HP XPe thin client. Patches for both are included in the image. Number of Viruses Exploited Vulnerability Number Exploited Vulnerability Name 28 MS Incorrect MIME Header Can Cause IE to Execute Attachment 16 MS Share Level Password 6 MS Buffer Overrun In RPC Interface Could Allow Code Execution 3 MS Scriptlet.typelib/eyedog 2 MS Microsoft VM ActiveX Component 1 MS IRFRAME ExecCommand 1 MS Malformed Header 1 MS Cache Bypass 1 MS Unchecked Buffer in Windows Component In addition to being a smaller target, HP s thin client XP embedded OS contains an Enhanced Write Filter (EWF) preventing damage to the local file system and its OS files. The EWF protects the contents of the media by redirecting all the writes to a temporary virtual memory location. These writes are lost when the system is shutdown or restarted. Finally, none of these vulnerabilities were relevant to the HP CE.NET thin client. CE.NET is significantly smaller than XPe and is not a targeted operating system. Instant Messaging Multimedia Viewers 2003 saw a rise in viruses that infected devices via instant messenger (IM) clients. The proliferation of IM clients and greater acceptance of their use in corporate settings will continue to increase the attractiveness of this vulnerability for virus infections 6. Instant messenger is an optional component for the HP thin client and can be removed to ensure the most secure environment. This technology is a growing concern for security conscious network administrators. The majority of infection occurs through infected/malicious code that is downloaded or shared via the internet. Security holes in internet Media Player have also been reported. Media Player-related intrusions are centered on requests and downloads of media files and skins. Media Player is an optional component for the HP thin client and can be removed to ensure the most secure environment. 6 Wildtrends 2003: A Look at Virus Trends in 2003 and a Few Prediction for 2004; A TruSecure Whitepaper 7
8 Thin Client Firewall Recovery Time Another key component to ensure the most secure computing environment is a firewall. HP offers the Microsoft Firewall as an add-on. If one of your systems on the network is compromised by malicious code, the firewall will prevent your thin client from infection. Additionally, a firewall will help prevent external attacks from reaching your system, protecting against intruders infecting the thin client with malicious code. In the event of a virus attack or other security issue, the HP thin client computing model offers significantly shorter recovery time when compared to the traditional desktop model. If a thin client s image is compromised or corrupted, the recovery time is typically measured in minutes instead of hours. Recovery usually involves a power cycle (1 minute), patch (5 minutes), or re-image (15 minutes) of the system. This is substantially less time than the typical two hours it takes to re-image a PC or the multiple hours that can be spent rebuilding and recovering a user s data and environment. The following graph compares the average recovery time of thin clients and desktop computers. In all categories, the HP thin client computing model meets or greatly exceeds the recovery speed performance of the traditional desktop computing model. Recovery Analysis Duration (in minutes) Scan/Isolate Clean/Remove Patch Vulnerability Action TC PC Re-Image (if necessary) 8
9 Summary The HP thin client computing model provides significantly better virus protection than its PC counterpart. This protection is achieved by: Centralizing an enterprise s computer resources in the data center. Using centralized virus protection and firewall tools to protect these resources. Segregating the user s data for enhanced security, backup, and quick recovery. Deploying HP thin clients for simple, secure, reliable, and efficient access to these centralized resources. Using HP centralized management tools to manage and patch at all levels of the enterprise. Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S. and other countries Hewlett-Packard Development Company, L.P. The information in this document is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. 06/2004 P/N
Thin Client Virus Vulnerability Analysis
Thin Client Virus Vulnerability Analysis Introduction............................................................ 3 Virus Vulnerabilities, Encounters, and Impact..................................... 4
Printing and Imaging Support on HP Compaq Thin Clients
Printing and Imaging Support on HP Compaq Thin Clients Overview.............................................................. 2 Microsoft Windows XP Embedded Operating System............................
Quick Start to Evaluating. HP t5630w, HP t5730w, HP gt7720
Get your thin client Get your running thin client running Right out Right out of of the box the box Quick Start to Evaluating HP Windows Embedded Standard Thin Clients HP t5630w, HP t5730w, HP gt7720 Get
Embedded Operating Systems Selection Guide
Embedded Selection Guide Common features........................................................2 Advantages of embedded operating systems and thin client hardware................... 3 Windows XP Embedded
Server based computing An introduction to server based computing, its advantages and how it works.
Server based computing An introduction to server based computing, its advantages and how it works. This whitepaper explains the concept of server based computing and defines the main components of its
Quick start to evaluating HP Windows Embedded Standard 2009 Thin Clients. HP t5630w, HP t5730w, HP t5740, HP gt7720
Get your thin client running Right out of the box Quick start to evaluating HP Windows Embedded Standard 2009 Thin Clients HP t5630w, HP t5730w, HP t5740, HP gt7720 Get your new thin client system up and
How To Use The Enhanced Write Filter On Windows Xp Embedded (Dota) With A Powerbook (Dot) And Powerbook 2 (Windows Xp) With An Overlay (Powerbook) With The Write Filter (Wfmgr) On A
Using the Enhanced Write Filter HP Windows XP Embedded-based thin clients: t5630 t57x0 Abstract... 2 Introduction... 2 Benefits of the Enhanced Write Filter... 2 Enhanced Write Filter Status Service...
HP Thin Client Imaging Tool
HP Thin Client Imaging Tool Table of Contents: Abstract... 1 Introduction... 1 System Requirements... 1 Software... 1 Hardware... 1 Getting Started... 2 Formatting a USB Flash Device... 3 Unpacking the
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
HP Thin Clients Flash/SSD Selection
Technical white paper HP Thin Clients Flash/SSD Selection Table of contents Executive summary... 2 Introduction... 2 Considerations for selecting storage devices... 2 Operating system write filter enablement...
HP ThinPro. Table of contents. Connection Configuration for RDP Farm Deployments. Technical white paper
Technical white paper HP ThinPro Connection Configuration for RDP Farm Deployments Table of contents Introduction... 2 Obtaining the Load Balance Information URL... 2 Single farm deployments... 2 Multiple
QuickSpecs. HP Device Manager
OVERVIEW is enterprise-class thin client management software that allows customers to view their thin client assets remotely and to manipulate those thin clients to meet the required business need. To
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances
HP Compaq dc7800p Business PC with Intel vpro Processor Technology and Virtual Appliances Introduction............................................................ 2 What is Virtualization?....................................................2
HP 8-GB PC3-12800 (DDR3-1600 MHz) SODIMM
Overview Models PC3-12800 (DDR3-1600MHz) DIMMs HP 2-GB PC3-12800 (DDR3-1600 MHz) DIMM HP 4-GB PC3-12800 (DDR3-1600 MHz) DIMM HP 8-GB PC3-12800 (DDR3-1600 MHz) DIMM PC3-12800 (DDR3-1600 MHz) SODIMMs HP
HP Service Manager Architecture and Security HP Software-as-a-Service
HP Service Manager Architecture and Security HP Software-as-a-Service Introduction...2 Architecture...2 Infrastructure Setup...4 Security Setup...4 Customer Infrastructure Requirements...5 Introduction
Sharing Pictures, Music, and Videos on Windows Media Center Extender
Sharing Pictures, Music, and Videos on Windows Media Center Extender Applies to: Microsoft Windows XP Media Center Edition Microsoft Windows Media Center Extender Microsoft Windows Media Center Extender
ThinPrint.print Server Engine installation and architecture
ActiveAnswers iss solutions september 2003 installation guide ThinPrint.print Server Engine installation and architecture contents introduction... 3 SBC printing challenges... 3 enterprise computing printing
HP Notebook Hard Drives & Solid State Drives. Identifying, Preventing, Diagnosing and Recovering from Drive Failures. Care and Maintenance Measures
HP Notebook Hard Drives & Solid State Drives Identifying, Preventing, Diagnosing and Recovering from Drive Failures Care and Maintenance Measures Technical White Paper Table of contents Identifying, Preventing,
QuickSpecs. HP Data Protector Express Single Server Edition 4.0 Service Pack 1 Overview
Overview HP Data Protector Express Single Server Edition is easy to install, easy to use and easy to manage backup and recovery software. It is only available with HP StorageWorks tape drives and HP StorageWorks
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
WhitePaper THIN CLIENTS
THIN CLIENTS Benefits and savings of using thin clients THIN CLIENTS This whitepaper describes the advantages of using thin clients as opposed to PCs (fat clients), and demonstrates how thin clients can
HP Security Solutions for Microsoft
HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier
Protecting Content and Securing the Organization Through Smarter Endpoint Choices
Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops
HP Data Protection. Business challenge: Resulting pain points: HP technology solutions:
Business challenge: HP Data Protection Solutions GUIDE How to protect rising data volumes without increasing operational costs and management overheads Resulting pain points: Meeting the backup window
HP Business Service Management
HP Business Service Management Software Version: 9.26 Windows operating system RUM for Citrix - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 RUM for Citrix
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User
Bluetooth Pairing. User Guide
Bluetooth Pairing User Guide Copyright 2012 Hewlett-Packard Development Company, L.P. Microsoft, Windows, and Windows Vista are U.S. registered trademarks of Microsoft Corporation. Bluetooth is a trademark
HP Smart Array 5i Plus Controller and Battery Backed Write Cache (BBWC) Enabler
Overview HP Smart Array 5i Plus Controller and Battery Backed Write Cache (BBWC) Enabler Models Smart Array 5i Plus Controller and BBWC Enabler bundled Option Kit (for ProLiant DL380 G2, ProLiant DL380
Virtual Desktop Infrastructure
Virtual Desktop Infrastructure Improved manageability and availability spur move to virtualize desktops Many companies have turned to virtualization technologies for their servers and in their data centers
Symantec AntiVirus for Network Attached Storage Integration Guide
Symantec AntiVirus for Network Attached Storage Integration Guide Introducing Symantec AntiVirus for Network Attached Storage The software described in this book is furnished under a license agreement
Using HP System Software Manager for the mass deployment of software updates to client PCs
Using HP System Software Manager for the mass deployment of software updates to client PCs Introduction... 2 HP manageability solutions... 2 SSM overview... 3 Software updates... 3 Why not SSM-enabled?...
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Disaster Recovery Guide Table of contents Overview... 2 General recovery process... 2 Recovering the HPDM Server... 5 Backing up the data... 5 Installing the
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
FTP Image Update for HP Linux Thin Clients
FTP Image Update for HP Linux Thin Clients Imaging process overview.................................................. 2 Updating thin client images................................................. 3 Local
HP Security Assessment Services
HP Security Assessment Services HP Data Center Services Technical data Your corporate information and intellectual property are important assets that you want to protect from unauthorized users. Developing
Using HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
How to use Data Protector 6.0 or 6.10 with Exchange Recovery Storage Groups to restore a single mailbox
How to use Data Protector 6.0 or 6.10 with Exchange Recovery Storage Groups to restore a single mailbox Introduction... 3 Exchange 2003... 4 Creating a Recovery Storage Group... 4 Restoring the Information
Citrix XenDesktop Architecture and Implementation on ProLiant Servers
Citrix XenDesktop Architecture and Implementation on ProLiant Servers integration note Abstract... 2 What is Citrix XenDesktop?... 2 Virtual Desktops... 2 Why use the HP integrated XenServer?... 4 HP ProLiant
Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
Creating and Restoring Images on the HP Thin Client with Altiris Deployment Server v6.5
Creating and Restoring Images on the HP Thin Client with Altiris Deployment Server v6.5 HP thin clients running Microsoft Windows Embedded Standard 2009 (WES) and Windows XP Embedded (XPe) Table of Contents:
Installing and Configuring HP Remote Desktop Protocol (RDP) Multimedia and USB Enhancement Software for Linux
Installing and Configuring HP Remote Desktop Protocol (RDP) Multimedia and USB Enhancement Software for Linux Overview... 2 Enhanced Multimedia Experience on an RDP Connection... 2 Extends USB Connectivity...
HP ThinPro. Table of contents. Enabling RemoteFX for RDP. Technical white paper
Technical white paper HP ThinPro Enabling RemoteFX for RDP Table of contents Overview... 2 Operating system requirements... 2 USB redirection... 2 Enabling RemoteFX on the RDP server... 2 Windows 7 and
Using Integrated Lights-Out in a VMware ESX environment
Using Integrated Lights-Out in a VMware ESX environment 2 nd Edition Technology Brief Abstract... 2 ilo architecture in a virtualized environment... 2 The benefits of ilo in a virtualized environment...
Wyse Device Manager TM
Wyse Device Manager TM Secure, flexible and effective thin client management software All youneed toknow.here. An introduction to Wyse Device Manager TM Minimize your desktop support costs. Maximize desktop
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
QuickSpecs. HP Session Allocation Manager Software (SAM v2.3) Overview
Overview Introduction A key component of the HP Virtual Client Essentials software portfolio, Session Allocation Manager (SAM) administrative software brokers network connections to seamlessly deliver
HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU
HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU Data sheet Product overview The HP TippingPoint Virtual Controller + Virtual Firewall (vcontroller+vfw) extends our leading intrusion
Windows 7 XP Mode for HP Business PCs
Windows 7 XP Mode for HP Business PCs Table of Contents: Introduction...1 Disclaimer...1 Main features and benefits... 2 Hardware Requirements...2 Minimum Hardware Requirements... 3 Recommended Hardware
Quick Reference Guide for Microsoft Windows XPe-based Thin Clients - t5720 & t5730 Quick Reference Guide
Quick Reference Guide for Microsoft Windows XPe-based Thin Clients - t5720 & t5730 Quick Reference Guide Copyright 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Using HP StoreOnce D2D systems for Microsoft SQL Server backups
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
WHITE PAPER. HP Guide to System Recovery and Restore
WHITE PAPER January 2003 Prepared By PSG Product Software Engineering Hewlett-Packard Company CONTENTS Purpose3 Using Safe Mode To Diagnose And Correct Problems 4 Using the Recovery Console To Repair Damaged
Server Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
HP Digital Signage Player MP4 and MP9 Microsoft Windows Embedded Standard 7. Quick Reference Guide
HP Digital Signage Player MP4 and MP9 Microsoft Windows Embedded Standard 7 Quick Reference Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Infinity Acute Care System monitoring system
Infinity Acute Care System monitoring system Workstation security in a networked architecture Introduction The benefits of networked medical devices for healthcare facilities are compelling. However, the
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Introduction of VMware Horizon Advanced 10 Pack 1yr, 3yr and 5yr support, electronic format.
Overview HP Client Virtualization is an end-to-end client virtualization solution based on the best managed and virtualization-ready HP ProLiant and BladeSystem servers, HP storage, and HP Thin Client
New Advanced RAID Level for Today's Larger Storage Capacities: Advanced Data Guarding
White Paper October 2000 Prepared by Storage Products Group Compaq Computer Corporation Contents Introduction...2 What customers can expect from Compaq RAID ADG solution...3 RAID ADG Features and Benefits...3
A closer look at HP LoadRunner software
Technical white paper A closer look at HP LoadRunner software Table of contents Sizing up the system 2 The limits of manual testing 2 A new take on testing: the HP LoadRunner solution 3 The HP LoadRunner
Models Smart Array 6402A/128 Controller 3X-KZPEC-BF Smart Array 6404A/256 two 2 channel Controllers
Overview The SA6400A is a high-performance Ultra320, PCI-X array controller. It provides maximum performance, flexibility, and reliable data protection for HP OpenVMS AlphaServers through its unique modular
How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer
Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3
HP VMware ESXi 5.0 and Updates Getting Started Guide
HP VMware ESXi 5.0 and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HP VMware ESXi. HP Part Number: 616896-002 Published: August 2011 Edition: 1 Copyright
QuickSpecs. What's New. Models. ProLiant Essentials Server Migration Pack - Physical to ProLiant Edition. Overview
Overview Upgrading or replacing your existing server? Migration is now an option! Replicate the server you are replacing using the software, the only product of its kind from a server vendor that provides
HP Client Automation software Starter and Standard Editions
HP Client Automation software Starter and Standard Editions Data sheet Managing client devices effectively and efficiently is a mission-critical function for today s businesses. However, that challenge
HP Insight Capacity Advisor Virtualization Services
HP Insight Capacity Advisor Virtualization Services HP Services Service overview HP Insight Capacity Advisor Virtualization Services (icavs) can assist you in understanding and developing a consolidated
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Evaluating Thin-Client Security in a Changing Threat Landscape
IT@Intel White Paper Intel Information Technology Business Solutions April 2010 Evaluating Thin-Client Security in a Changing Threat Landscape Executive Overview Equivalent security controls can be, and
At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers
Instructions for installing Microsoft Windows Small Business Server 2003 R2 on HP ProLiant servers integration note Abstract... 2 Installation requirements checklists... 3 HP ProLiant server checklist...
HP Softpaq Download Manager and HP System Software Manager
Technical white paper HP Softpaq Download Manager and HP System Software Manager A Powerful Combination Table of contents Executive summary... 2 Overview of HP SDM and HP SSM... 2 Use case for HP SDM and
QuickSpecs. HP Compaq t5525 Thin Client. Overview
Overview 1. 10/100 RJ-45 6. PS/2 Connector 2. Security lock 7. DC Power Input 3. Parallel Connector 8. Video Connector 4. USB Connectors 9. Serial Connector 5. Audio connector (mic in/line out) DA - 12265
Customizing Asset Manager for Managed Services Providers (MSP) Software Asset Management
HP Asset Manager Customizing Asset Manager for Managed Services Providers (MSP) Software Asset Management How To Manage Generic Software Counters and Multiple Companies Legal Notices... 2 Introduction...
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
HP Real User Monitor. Release Notes. For the Windows and Linux operating systems Software Version: 9.21. Document Release Date: November 2012
HP Real User Monitor For the Windows and Linux operating systems Software Version: 9.21 Release Notes Document Release Date: November 2012 Software Release Date: November 2012 Legal Notices Warranty The
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End
Microsoft Windows XP Service Pack 1 on Compaq Evo Notebooks
White Paper September 2002 Prepared by: PSG Notebook Software Marketing and Engineering Compaq Computer Corporation Contents Introduction... 3 Tested Systems... 3 Installation tips for Service Pack 1...
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
HP ThinShell. Administrator Guide
HP ThinShell Administrator Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of the Microsoft group of companies. Confidential computer
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements
The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Windows Embedded 8 Standard for HP Thin Clients. Quick Reference Guide
Windows Embedded 8 Standard for HP Thin Clients Quick Reference Guide Copyright 2013 Hewlett-Packard Development Company, L.P. HP Velocity is Copyright 2013 LiveQoS ncorporated All Rights Reserved. Microsoft
Virtual Desktop Infrastructure Planning Overview
WHITEPAPER Virtual Desktop Infrastructure Planning Overview Contents What is Virtual Desktop Infrastructure?...2 Physical Corporate PCs. Where s the Beef?...3 The Benefits of VDI...4 Planning for VDI...5
Simplifying the Desktop Transformation with HP and Liquidware Labs
Simplifying the Desktop Transformation with HP and Liquidware Labs User Virtualization Management and Dynamic Application Portability Technical white paper Table of contents Executive summary... 2 Persona
Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S
HP Education Services course data sheet Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S Course Description In this class, you will learn how to design, configure, and manage a SharePoint
HP Connection Manager. Administrator's Guide
HP Connection Manager Administrator's Guide Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft, Windows, and Windows
