A secure computing system is provided which utilizes a unique combination
of Public Key Infrastructure (PKI), Virtual Private Networking (VPN), and
server-based computing on thin client devices. The combination of
technology and components provide secure computing through
Defense-in-Depth using commercial off-the-shelf components.