TSXV:ISD.H - Post by User
Comment by
majortom75on Jan 22, 2015 8:50am
120 Views
Post# 23350328
RE:So maybe
RE:So maybeThe Jentu technology is not strictly about security or P OS terminals. It is about diskless workstations or non-persistent storage at the endpoint, and the management of those endpoints. The applicability to P OS terminals is with respect to terminals that use Windows as the OS and where the operator or user of the terminal has the ability to interact directly with the OS or where an unpatched Windows flaw allows malicious code execution. In a Jentu managed Windows based P OS terminal, the "gold image" can be patched once and then all the individual P OS terminals reboot and load the gold image over the network; this is preferable to individually updating each installed P OS terminal. As nothing but an admin can modify that gold image, every reboot clears the slate and any malicious code running on the terminal is wiped out.
What may also have been identified as a threat vector is if an infected P OS terminal is integrated with an iSign SA, the malicious code could potentially use a type of phishing attack on unsuspecting shoppers via the iSign SA and its BT and wifi broadcast capabilities or that the malicious code on the P OS re-routes customer data gathered by the iSign SA to a 3rd party.
This may just be iSign seeking an opportunity to mitigate a risk that may have been blocking some deals.