At its RSA Conference USA 2013 session, Trusted
Computing Group (TCG) and members will host 12 demos
showing new ways to leverage widely available security solutions for
data protection, authentication, and network identity and access
The seminar Trusted
Computing: Billions of Secure Endpoints in 10 Years will be Monday,
10 a.m. – 2 p.m. in the Esplanade room, Moscone South. Los Angeles
County Chief Information Security Officer Robert Pittman will talk about
security challenges, followed by panel sessions with leading industry
analysts, technologists and end users.
will include a number of new ways to solve current and emerging security
Absolute Software will show remote management of TCG
Opal-based self-encrypting drives via a cloud interface.
Asguard Networks will implement TCG’s IF-MAP
industrial control systems security specification to manage
multiple independent private isolated networks, working with Juniper
Networks’ IF-MAP 2.0 server.
Fraunhofer SIT will use attestation based on the Trusted
Platform Module (TPM) to secure mobile ad hoc networks, securing
them against attacks by verifying status and identity. The IF-MAP
specification is used to show the network status graphically.
Lumeta, Juniper Networks and Infoblox show how to implement automated
enforcement of network policy, protecting against backdoor attacks by
discovering rogue or unauthorized network connections and dynamically
managing access privileges. Clients and servers based on IF-MAP and TNC
Policy Decision and Policy Enforcement Point specifications are
Hirsch Identive will use IF-MAP to integrate data from its physical
security management system to network access control. Users must be
physically present, for example, to gain network access.
Microsoft, Juniper Networks and Infoblox use various TCG Trusted
Network Connect (TNC) specifications for endpoint identification,
device profiling and network access control for securing a BYOD
MITRE Corporation will show a prototype for high security TPM
provisioning for the enterprise, bypassing traditional and inherently
insecure software provisioning methods. Demonstration code will be
NCP will demonstrate the integration of different IT security systems,
including firewalls, intrusion detection and a VPN, to counter threats
from remote devices. If threats are detected, access to the device is
limited or shut down; the TPM
is used to check the health of remote embedded systems to determine if
they will be connected.
Nokia’s Lumia 920 mobile device will demonstrate secure boot and
support for device integrity, which provides a secure foundation for
trusted applications and services.
solid-state drives (SSDs) from Samsung will be shown for performance,
security and protection against breach laws.
Wave Systems will demonstrate the role of UEFI
and secure booth and the TPM; managed SEDs; and how infected devices
can be detected and denied network access.
WinMagic will show how SEDs
based on the TCG Opal specification are managed in Windows 8
environments, preventing attacks.
The Trusted Computing Group (TCG) is a not-for-profit organization that
develops, defines and promotes open, vendor-neutral, global industry
standards based on a hardware root of trust, for interoperable trusted
computing platforms. Billions of endpoints use TCG standards to ensure
system integrity, protect networks and secure data. For more
information, see www.trustedcomputinggroup.org
and on Twitter
Brands and trademarks are the property of their respective owners.
Tweet this: #RSA2013 @TrustedComputin session 2/25. http://bit.ly/10PHESD