New Protocol Improves Interaction among Networked Devices and Applications
"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices."
Full Computing Now Article Available Here.
Enhancements to Hardware-Based Security: TPM and Windows 8
TCG members discuss the impact of the relationship between Windows and TPM, including how it can evolve to improve security moving forward.
TNC Global Professional Services Firm Case Study
One large global professional services organization has implemented TNC specifications to ensure corporate networks are protected.
Secure Embedded Platforms with Trusted Computing
Automotive and other systems in the internet of things must be protected.
Protecting Your Enterprise with Security Automation Webinar
Steve Hanna and David Waltermire talked about the war of info security and the battle between attackers and defenders.
To enhance your experience, please download the free Adobe Flash Player
Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.