What are the trends and developments with zero clients and secure endpoints?

TERA2 chip zero clients were introduced in 2005.

Then, in response to customers needing an endpoint with the flexibility of a thin client but with a higher level of security, ClearCube Technology introduced Zero+ clients. 

In 2023 the latest generation of zero client was released, the Trusted Zero Client (TZC).

TERA2 chip zero clients were introduced in 2005.

Then, in response to customers needing an endpoint with the flexibility of a thin client but with a higher level of security, ClearCube Technology introduced Zero+ clients. 

In 2023 the latest generation of zero client was released, the Trusted Zero Client (TZC).

• TZCs utilize PCoIP remoting technology to connect securely to a host computer (physical or virtual), but the connection is governed by HP Anyware software instead of physical chips in the zero client and in the host computer.  

• TZCs are only produced in certified manufacturing facilities, and each TZC is embedded with a “birth certificate” at the time of manufacture, indicating its configuration is according to the security standards. 

• The Anyware Trust Center security console ensures a TZC remains in its original, secure condition and is authorized to make the assigned network connection. 

These are key aspects to how TZCs are made and managed so that they adhere to Zero Trust principles.  TZCs come with copper or fiber network connections, optional integrated CAC readers, and the capability to support dual- or quad-display.  TZCs are an exciting development in secure endpoint technology and an emerging option, depending on the requirements.

Zero+ clients allow for more flexibility in the number and types of connections and protocols that can be used.  Because Zero+ clients have soldered down internal components, they are at a reduced security risk by device theft or tampering.  Stratodesk is a secure OS and protocol that provides encryption and limits actual data transfer between the endpoint and host computer.  This allows for an endpoint, such as the Zero+ that has hardened physical security features, to operate with the transmission security features of a zero client.  A Zero+ client can easily be repurposed by IT to make other network connections, giving end users the flexibility they need and giving IT a device that works in changing IT environments.

This website uses cookies to improve your experience.
See our Privacy Policy to learn more.