SAGEM, the company that used to make them was bought by ingenico, so this is the last SAGEM branded model. It's obsolete by 2 generations since generally these things go out of style (and certifications) very quick. This specific device cannot be installed in europe anymore since it's not allowed by the PCI.
These things are serviceable by authorised dealers. Easy stuff, change the board, change the printer etc. In order to have it running again, you need to use a comissioning process which inject the keys inside using specialized tools. So no, these are not 1 use only.
Now on the security side. When there is a security breach, the only thing that gets erased are the banking keys (and a big flashing key on the screen when it powers on). Without the banking keys, no transaction can happen. Practically there is no way to steal the banking keys themselves (even after bypassing the security) apart from depotting the cryptoprocessor or something. It's true that the cryptoprocessor is sensitive to voltage, temperature and humidity variations, which makes even depotting practically impossible.
The main reason for the banking keys are to protect the PIN itself. The cleartext pin only has to travel between the pinad (physical keypresses) and the cryptoprocessor where it gets encrypted. The whole idea of tamper resistant and tamper evident is that if a person tries to install a skimming device, the POS stops working altogether (and the big flashing key thingy...). The magstripe data are irelevant to the security since it can be easily stolen anyway if magnetic stripe is used (mainly USA, europe moved away).
The SAM slots which are used to insert smartcards are mainly for legacy applications since they were used as encryption devices in the olden days (10 years ago?), but because of PCI nowadays the only device that is allowed to be used as an encryption device is the secure cryptoprocessor.
The USBs on the side are indeed for software loading.
The applications (firmware) that are installed need to be cryptographically signed which means that:
a. only authorized persons can install software
b. if malicious software is found, its source can be found
Can it be hacked? Probably. I have personally worked in the industry for some time and I have never seen or heard of a PCI certified EFTPOS terminal being hacked into a skimming device or whatever. Usually the easier targets are the ATMs or the less secure EFTPOS terminals that are used in the US.
One interesting bit. Although I personally haven't used this feature and I am not 100% sure about it, I think the big cap is used as a micro-UPS. When the power is cut, the banking application gets a "power is cut" interrupt which gives it just enough time to save the state it's in. This is very useful so that no wrong bank charges happen.