Industry Data

New Protocol Improves Interaction among Networked Devices and Applications

 

"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices." 

 

Full Computing Now Article Available Here.

Solutions

  • Introduction to TCG: Training Videos

    The Open Security Training Team has developed coursework as an introduction to Trusted Computing.

    Learn More

    Authentication

  • TNC Global Professional Services Firm Case Study

    One large global professional services organization has implemented TNC specifications to ensure corporate networks are protected.

    Learn More

    Network Access & Identity

  • Secure Embedded Platforms with Trusted Computing

    Automotive and other systems in the internet of things must be protected.

    Learn More

  • Architect's Guide: ICS Security Using TNC Technology

    This Architect’s Guide shows Information Technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security.

    Learn More

    Data Protection

  • TCG Architect’s Guides

    TCG has published a new series of architect's guides to do just that - provide step-by-step blueprints with examples and tips.

    Learn More

    Authentication


  • To enhance your experience, please download the free Adobe Flash Player

    Get Adobe Flash player

Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.

 

Applications

Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.