New Protocol Improves Interaction among Networked Devices and Applications
"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices."
Full Computing Now Article Available Here.
Enhancements to Hardware-Based Security: TPM and Windows 8
TCG members discuss the impact of the relationship between Windows and TPM, including how it can evolve to improve security moving forward.
Introduction to TCG: Training Videos
The Open Security Training Team has developed coursework as an introduction to Trusted Computing.
How to Keep Your Data Secure: New Strategies from the Trusted Computing Group
TNC Global Professional Services Firm Case Study
One large global professional services organization has implemented TNC specifications to ensure corporate networks are protected.
Secure Embedded Platforms with Trusted Computing
Automotive and other systems in the internet of things must be protected.
To enhance your experience, please download the free Adobe Flash Player
Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.