Devon IT's Ceptor Converts HDMI Displays into Zero Client Devices

Devon IT has unveiled Ceptor, an ultra-compact device that converts any HDMI-capable monitor or TV into an interactive zero client.

According to the company, the Ceptor zero client device is a "full-featured enterprise client desktop access point that is configurable, persistent, and fully manageable." It is slightly larger than a USB memory stick and plugs into the HDMI port of a TV or monitor. Once plugged in, users can run Devon IT's zero client operating system, ZeTOS, and then enter their username and password to access their virtual desktops through a remote session.

ZeTOS allows Ceptor to run in a stateless condition, so users can't run programs or start remote sessions that have not been authorized by an administrator. Ceptor also doesn't require any special firewall or routing rules for security because it doesn't broadcast or auto-discover network protocols, and because terminals have no local persistent memory, there are no threats from viruses or malicious software, according to Devon IT.

Company president, Joe Makoid, calls it a "game changer for the VDI market" because of its full-featured capabilities, small size, and low price.

Key features of Ceptor include:

  • Dual core ARM processor with ZeTOS already installed;
  • Management capabilities through Devon IT's Echo thin client management software platform;
  • Full virtual desktop experience when plugged into an HDMI monitor and network;
  • Integrated Bluetooth and Wi-Fi capability;
  • USB On-The-Go through a USB-B micro host port; and
  • High definition 1080p video output.

Ceptor will be available for $89 (MSRP). Future versions of Ceptor will offer lower cost processors and also run Android, according to information provided by the company.

Future information about Ceptor can be found at devonit.com.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • row of students using computers in a library

    A Return to Openness: Apereo Examines Sustainability in Open Source

    Surprisingly, on many of our campuses, even the IT leadership responsible for the lion's share of technology deployments doesn't realize the extent to which the institution is dependent on open source. And that lack of awareness can be a threat to campuses.

  • abstract pattern of cybersecurity, ai and cloud imagery

    OpenAI Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • cloud icon with a padlock overlay set against a digital background featuring binary code and network nodes

    New Cloud Security Auditing Tool Utilizes AI to Validate Providers' Security Assessments

    The Cloud Security Alliance has announced a new artificial intelligence-powered system that automates the validation of cloud service providers' (CSPs) security assessments, aiming to improve transparency and trust across the cloud computing landscape.

  • geometric grid of colorful faculty silhouettes using laptops

    Top 3 Faculty Uses of Gen AI

    A new report from Anthropic provides insights into how higher education faculty are using generative AI, both in and out of the classroom.