



Unlike legacy display protocols, which were built to deliver applications, PC over IP was built from the ground up with desktop delivery in mind. In a typical deployment, software-based clients and servers are used to remotely access PC desktops. With PCoIP, the entire computing experience is compressed, encrypted and encoded in the data center before being transmitted across a standard IP network to PCoIP-enabled endpoint devices. The PCoIP protocol uses encrypted UDP traffic, with AES encryption, for streaming pixels.The streaming connection, using port 4172 (TCP and UDP), is encrypted by using AES-128 and AES-256 ciphers, but the encryption defaults to 128-bit. Upgrade and manage your existing PCoIP Remote Workstation Cards or buy more from our OEM partners to harness the power of high-end towers, blade servers, or rack workstations and connect users anywhere to their graphics intensive applications, designs, and images. while the bulk data traffic is protected via the PCoIP protocol which encrypts and authenticates all the data sent over the network using AES-GCM 5 authenticated encryption algorithm.
