Hitachi division looks to network terminal model

Share this article:

A Hitachi business unit plans to replace laptops with network terminals for data security purposes – a move viewed both as sensible by some security experts, and shocking by others.

The Information and Telecom-munication Systems group of Hitachi, based in Tokyo, plans to replace laptops with 2,000 network terminals in Japan this year, said Gerard Corbett, U.S. spokesman for the electronics maker.

"It is basically an evaluation – internal only. The primary purpose is for security," he said.

Bob Lonadier, senior product manager for Citrix Systems, said he is not surprised that Hitachi is looking to thin clients as a means of bolstering security.

"Not having the local disk on the desktop greatly enhances your security posture," he said.

But Jeff Johnson, vice-president of solutions and services at Oversight Systems, said he was shocked by Hitachi's move to an old-style architecture. The company probably uses many types of applications, including ones that need to reside on the client, he noted. "It's bizarre," he said.

Centralized computing improves security because in a decentralized model, "you don't know what people are doing on their desktops," said Brad Johnson, vice-president at security consultancy SystemExperts.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Researchers observe more than a hundred connections to 'Backoff' sinkhole

Researchers with Kaspersky Lab were able to sinkhole two command-and-control servers used by certain Backoff point-of-sale malware samples.

Judge lifts stay but Microsoft won't hand over emails during appeal

A judge has lifted a suspension of a previous order compelling Microsoft to hand over customer emails stored on a server in Ireland.

Home Depot investigates possible payment card breach

Home Depot investigates possible payment card breach

Home Depot said on Tuesday that it is working with its banking partners and law enforcement to investigate a possible data breach.