Only if the person removing it has the matched key for removal and removal permissions in the management system (Xcalibur Global). Any attempt to remove a locked device by brute force will permanently damage the device and make it unusable / un-sellable.
Can Jack-PC protect against USB Key-loggers and modified keyboards?
The Jack-PC provides several protection mechanisms against key-loggers. Consult Chip PC FAEs for additional information and guidance. Keyboards may be authenticated by asset tags or unique ID to avoid keyboards replacement.
What are the advantages of the Jack-PCs secondary security processor?
The secondary processor embedded in the Jack-PC can offload the main processor during laborious security tasks.
For example:
a. Open single or multiple VPN sessions
b. SSL encryption / decryption
c. IPSec, state-full packets inspection
d. Non-standard traffic encryption / decryption
e. Complex authentications
Do I need to install any Anti-virus on the Jack-PC?
No. Jack-PC is the most secured client in the market. Many redundant strong security mechanisms are built into the product design to assure very low risk of viruses infection, worms or any other malicious code. No anti-virus, no security updates and patches are provided for the Jack-PC.
Yes. This is an integrated part of the Jack-PC image and the management solution.
In general there are 2 ways to implement a single sign on Jack-PCs:
a. Providing passed-through credentials from the device side.
b. Providing passed- through credentials from the server (Xcalibur Global) side.
Using either method you can pass logged user credentials to any resource (local browser, ICA, RDP, Media Player, Terminal Emulations etc.)