Trusted Computing Group to Host 12 Seminars at RSA Conference
Feb 27, 2013 (Close-Up Media via COMTEX) --
At its RSA Conference USA 2013 session, Trusted Computing Group (TCG) and members will host 12 demos showing new ways to leverage available security solutions for data protection, authentication, and network identity and access management.
The seminar Trusted Computing: Billions of Secure Endpoints in 10 Years will be Monday, 10 a.m. - 2 p.m. in the Esplanade room, Moscone South. Los Angeles County Chief Information Security Officer Robert Pittman will talk about security challenges, followed by panel sessions with industry analysts, technologists and end users.
Demos will include a number of new ways to solve current and emerging security issues.
-Absolute Software will show remote management of TCG Opal-based self-encrypting drives via a cloud interface.
-Asguard Networks will implement TCG's IF-MAP industrial control systems security specification to manage multiple independent private isolated networks, working with Juniper Networks' IF-MAP 2.0 server.
-Fraunhofer SIT will use attestation based on the Trusted Platform Module (TPM) to secure mobile ad hoc networks, securing them against attacks by verifying status and identity. The IF-MAP specification is used to show the network status graphically.
-Lumeta, Juniper Networks and Infoblox show how to implement automated enforcement of network policy, protecting against backdoor attacks by discovering rogue or unauthorized network connections and dynamically managing access privileges. Clients and servers based on IF-MAP and TNC Policy Decision and Policy Enforcement Point specifications are implemented.
-Hirsch Identive will use IF-MAP to integrate data from its physical security management system to network access control. Users must be physically present, for example, to gain network access.
-Microsoft, Juniper Networks and Infoblox use various TCG Trusted Network Connect (TNC) specifications for endpoint identification, device profiling and network access control for securing a BYOD environment.
-MITRE Corp. will show a prototype for high security TPM provisioning for the enterprise, bypassing traditional and inherently insecure software provisioning methods. Demonstration code will be made available.
-NCP will demonstrate the integration of different IT security systems, including firewalls, intrusion detection and a VPN, to counter threats from remote devices. If threats are detected, access to the device is limited or shut down; the TPM is used to check the health of remote embedded systems to determine if they will be connected.
-Nokia's Lumia 920 mobile device will demonstrate secure boot and support for device integrity, which provides a secure foundation for trusted applications and services.
-Self-encrypting solid-state drives (SSDs) from Samsung will be shown for performance, security and protection against breach laws.
-Wave Systems will demonstrate the role of UEFI and secure booth and the TPM; managed SEDs; and how infected devices can be detected and denied network access.
-WinMagic will show how SEDs based on the TCG Opal specification are managed in Windows 8 environments, preventing attacks.
The Trusted Computing Group (TCG) is a not-for-profit organization that develops, defines and promotes open, vendor-neutral, global industry standards based on a hardware root of trust, for interoperable trusted computing platforms.
((Comments on this story may be sent to firstname.lastname@example.org))
[ Back to the Next Generation Communications Community's Homepage ]