Data security is one of the top concerns for organizations in any industry. In 2015, an estimated 781 data breach incidents led to the disclosure of over 169 million records in the US alone. These are record-breaking figures, and not in a way any organization wants to break records.
According to the Global State of Information Security Survey 2016, exploited mobile devices account for more than one-third of cyber security incidents. Employees are emailing data, using personal cloud services to move corporate data around, are falling prey to phishing attacks or are simply losing devices. With the consumerization of IT, more mobile devices than ever are entering the workplace and organizations are struggling to regain control of data security. Teradici's PCoIP technology offers a way to support the spectrum of local, remote, mobile and collaborative work while reducing the IT overhead and maintaining enterprise-grade security.
The Teradici PCoIP protocol is breakthrough technology that revolutionizes the way data is secured in the workplace. Any PCoIP device — zero client, think client, laptop, tablet, or smartphone — can become a secure end-point, even personally-owned devices (BYOD). In industries where collaboration is key, but data risk is high, PCoIP offers another layer of protection. People can work collaboratively from anywhere, knowing that sensitive information never leaves the data center or cloud and corporate IP is protected.
Teradici PCoIP protocol transfers images only, in the form of pixels, so no data ever leaves the data center. In addition, because all software lies safely inside central systems, no one can tamper with service quality or introduce malware based on application infiltration. The PCoIP protocol leverages the AES 256 and NSA Suite B cyphers, which meet the highest level of security required by governments.
PCoIP solutions, whether in a data center or in the cloud, compress, encrypt and rapidly transport data as image pixels to the PCoIP end-user devices. These devices then decrypt, decompress and display the image on a screen. From a user’s perspective, the experience of interacting with the data is the same, but the result is that data remains protected in a central location, with no exposure in-transit. With data securely locked down centrally, the endpoint is immune to viral attack.
The Teradici PCoIP protocol works on many end-user devices, including those which are BYOD, once enabled. To enhance performance even further, and significantly reduce IT costs, organizations can deploy thin clients or PCoIP zero clients. The Teradici PCoIP Zero Client offers the ultimate in data security, with no hard drives, CPUs, local operating systems, or application software.
To learn how to achieve mission-critical security with Teradici PCoIP Zero Clients, check out our solution brief.