Security Basics mailing list archives
Thin Client recommendations
From: <slackzin () hush com>
Date: Mon, 30 Aug 2004 13:41:48 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hey all, We are currently in the midst of determining which thin client product would fit well within our environment (hippa is a major concern). Basically we want to use a thin client to access designated applications within our network (duh) from both internal as well as external sources. The presentation for the thin client will reside behind a firewall and vpn, and have all the appropriate controls and authentication methods implemented before any access to the client is granted, and to top it all off we are going to be implementing hids/nids at each hop between zones to make sure that everything is as cool as it can be. I am leaning towards a citrix solution, but I would like the opinions/flames of other technologies out there. Any details regarding the native monitoring and auditing (or lack there of) of those systems would also be greatly appreciated. Cheers, Chris -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkEzkQgACgkQ/vkXDScIoPEmCQCeILKyIc1ztpUBycV1ZaZ/oceuntAA oK/nWbd/eFKzy21Cieca2D/EkvRR =0X0A -----END PGP SIGNATURE----- Concerned about your privacy? Follow this link to get secure FREE email: http://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger http://www.hushmail.com/services-messenger?l=434 Promote security and make money with the Hushmail Affiliate Program: http://www.hushmail.com/about-affiliate?l=427 --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- Thin Client recommendations slackzin (Aug 31)
- Re: Thin Client recommendations Charles J. Hammett Jr. (Sep 01)