+ All Categories
Home > Documents > Jentu_Intro_POS 15

Jentu_Intro_POS 15

Date post: 28-Jul-2015
Category:
Upload: timmagill
View: 8 times
Download: 1 times
Share this document with a friend
Popular Tags:
11
Jentu Technologies Inc. WHAT IS JENTU? Jentu is a paradigm shift in desktop computing – a secure latency-free diskless computing platform! “Parts left out can’t go wrong!”
Transcript

Je n tu Te ch n ologie s In c.

ü

WHAT ISJ ENTU?Jentu is a paradigm shift in desktop computing – a secure latency-free diskless computing platform!

“Parts left out can’t go wrong!”

Je n tu Te ch n ologie s In c.

üüWHY J ENTU?

A unique technology offering three key benefits:

Increased desktop security Increased operational efficiencies Increased end user productivity

No other technology today can deliver all three benefits simultaneously!

Je n tu Te ch n ologie s In c.

üüJ ENTU ARCHITECTUREHYBRID CLOUD MANAGEMENT

ü

ü Commands sent over

encrypted tunnel

Diskless workstation/POS terminals connected on LAN using full processing capabilities

Microsoft File Server or Cloud Storage for Data

Jentu On-Premises Server for OS and App Streaming

Je n tu Te ch n ologie s In c.

ü

JENTU DATA BREACH MITIGATION AND CONTROLREBOOT to INSTANTLY RESTORE the individual PC to the original clean locked down desktop image to mitigate data breach impact!

“It's like an instant version of Ghost, or a more secure version of Deep Freeze” – Brian Madden

Je n tu Te ch n ologie s In c.

ü

INCREASED OPERATIONAL EFFICIENCIESTask automation increases administrator efficiency and reduces desktop support costs by up to 95%.

Je n tu Te ch n ologie s In c.

üJ ENTU WEB PANELCENTRALLY MANAGE ALL DESKTOP HARD DRIVE IMAGES

GROUPIndicates which group machine belongs to

MACMAC address is used to determine which machines are authorized to boot

ACTIONS(Un)lock, merge, reboot, shutdown, delete or get machine details

SERVERDetermines which server to use for boot

Je n tu Te ch n ologie s In c.

ü

Sample Jentu Target MarketPOINT OF SALEUNDER ATTACKPotential brittleness and obvious criticality of POS systems a factor in the slow patch deployment process on PoSmachines, significantly increasing risk.

“For quite some time, cyber criminalshave been targeting consumer dataentered in PoS system … cybercriminals deliver malware whichacquires card data as it passesthrough a PoS system.”

-- US-Cert Bulletin Jan 2

Je n tu Te ch n ologie s In c.

üü

Je n tu Te ch n ologie s In c.

üü

Je n tu Te ch n ologie s In c.

üü

Je n tu Te ch n ologie s In c.

ü


Recommended