Government

Government

Many Governments have recognized that hardware security is far superior to software-based security and have developed standards around smart cards and hardware tokens for authentication and other key security functions within the government networks.

As a result, Governments have acknowledged TCG's technology and Trusted Platforms as a security solution by specifying them in procurement practices. For example, in some branches of the United States Government, new computer purchases are required to include the Trusted Platform Module version 1.2. There is also a trend in some Government procurement to specify data protection and network access control solutions as defined by the Trusted Computing Group.

icon

Mazda North American Operations

Wave Systems’ EMBASSY® software and Seagate self-encrypting hard drives help Mazda North American Operations achieve Japan’s Sarbanes Oxley (J-SOX) compliance.

June 2010 | Case Studies | Add to Briefcase

icon

Juniper Networks Puts Bangchak Petroleum on Track for ISO 27001 Certification

This Juniper Networks deployment has provided Bangchak Petroleum with a complete information security solution that has enabled it to comply with the ISO 27001 information security standard.

February 2009 | Case Studies | Add to Briefcase

icon

St. Mary’s County Public Schools Keep Students on the Forefront of Science and Technology with Digital Learning Secured by Unified Access Control

With UAC, St. Mary’s was able to roll out a wireless one-to-one computing program to support its cutting-edge science, technology, engineering and math curriculum with confidence that data privacy and network security would be maintained.

February 2009 | Case Studies | Add to Briefcase

icon

St. Monica’s College Builds State-of-the-Art Network with Best-in-Class Solutions from Juniniper Networks

LJM Systems deployed Juniper’s SA4000 and IC4000 to provide the infrastructure for a secure intranet as well as an extranet that would enable staff and students to access St. Monica’s network from home and to differentiate their network and application access based on their role, whether remote or local.

February 2009 | Case Studies | Add to Briefcase

  • 1-4