HP Compaq t5720 Supplementary Manual page 2

Virus vulnerability analysis
Hide thumbs Also See for Compaq t5720:
Table of Contents

Advertisement

Enterprise computing networks require effective protection against computer viruses and other security
issues. Security breaches can result in costly service calls, user downtime, and loss of business-critical
data. When compared to the traditional unmanaged PC network model, the HP thin client computing
model yields a less vulnerable segregated approach to computing with substantially better recovery time,
while minimizing total cost of ownership (TCO).
1
According to an ICSA Labs virus analysis
, the average downtime lost during an encounter is 23 person
days. This downtime consists of data loss recovery and patching connected network servers and PCs.
With the HP thin client computing model, your vulnerability to virus attack on the thin
client system is significantly less than a standard Windows PC. This means that thin client
users will experience significantly less downtime due to security vulnerabilities than PC users. In addition,
since no user data resides on a thin client, there is no risk of user data loss on the thin client. Finally, if a
thin client's image is compromised or corrupted, recovery time is typically measured in minutes instead of
hours.
Additionally, the HP thin client computing model utilizes PC blades and/or servers located in a data cen-
ter. You can protect and monitor centrally-managed, data center resources more easily with antivirus and
firewall tools. You can correct and recover compromised thin client resources faster and cheaper than dis-
tributed PC resources. The thin client model also allows you to segregate and centralize a user's data for
easy backup and recovery, ensuring a higher level of service and security for your users at a lower TCO
than distributed PC resources.
At HP, we realize security and TCO are important factors in enterprise computing. A Fall 2003 EDC sur-
vey showed more than 8 out of every 10 enterprises suffered a security breach as a result of malicious
code. As a result, more than half of enterprises are increasing IT security budgets. HP believes the thin cli-
ent computing model is an effective solution for the security-conscious enterprise.
1.ICSA Labs 8th Annual Computer Virus Prevalence Survey
2

Advertisement

Table of Contents
loading

This manual is also suitable for:

Compaq t5725Compaq t5730

Table of Contents