Network Access & Identity

Network Access & Identity

Security Automation

TCG's Trusted Network Connect (TNC) network security architecture and open standards enable intelligent policy decisions, dynamic security enforcement, and communication between security systems. TNC provides pervasive security, Network Access Control (NAC) and interoperability in multi-vendor environments. 

TNC Offers Interoperable Standards For:
Secure Guest Access: With TNC, guests obtain restricted network access, without threatening the host network.
 
User Authentication: TNC integrates user authentication with network access to better manage who can use the network and what they are allowed to do.
 
Endpoint Integrity: TNC performs a health check for devices connecting to the network. Devices out of compliance can be restricted or repaired.
 
Clientless Endpoint Management: TNC offers a framework to assess, manage and secure clientless end points connected to the network, such as IP phones, cameras and printers.
 
Coordinated Security: Security systems coordinate and share information via the IF-MAP standard, improving accuracy, and enabling intelligent response.
icon

TCG Educational Webcasts

View the TCG hosted BrightTalk webcast channel.

May 2014 | Podcasts/Webcasts | Add to Briefcase

icon

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group.

December 2013 | Podcasts/Webcasts | Add to Briefcase

icon

Videos: Introduction to Trusted Computing

The Open Security Training Team has developed coursework as an introduction to Trusted Computing.

January 2013 | Podcasts/Webcasts | Add to Briefcase

icon

Steve Hanna Of Juniper Networks And Trusted Computing Group On BYOD Standards

Listen to Steve Hanna speak with Alan Shimel of Network World.

May 2012 | Podcasts/Webcasts | Add to Briefcase

icon

A New Approach to Mobile Security

Listen to Steve Hanna of the Trusted Computing Group discuss Architecting Secure Mobility at RSA Conference 2012.

March 2012 | Podcasts/Webcasts | Add to Briefcase

icon

Automate to Win: The Business Case for Standards-based Security

Thank you for joining us for the April 26, 2011 webinar about the TNC network security architecture, open standards created by the Trusted Computing Group, and the products that have implemented those standards.

April 2011 | Podcasts/Webcasts | Add to Briefcase

icon

TNC IF-MAP Interoperability Demonstration

During the 2010 October Members Meeting in Maui, Hawaii, the TNC provided an interoperability Demonstration.

November 2010 | Podcasts/Webcasts | Add to Briefcase

icon

Protecting Your Data, the Network and What’s Next for Trusted Computing

Recently, experts who have been involved in developing some of the key Trusted Computing technologies spoke about the future of these technologies, why users should implement them, and general security issues. TCG has captured these short interviews.

November 2010 | Podcasts/Webcasts | Add to Briefcase

icon

TNC Interfaces Enable Dynamic Differentiation

TNC interfaces published as IETF RFCs (standards) enable dynamic differentiation & access control enforcement for a wide variety of users in mixed-use environments.

September 2010 | Podcasts/Webcasts | Add to Briefcase

icon

Issues Surrounding Trusted Cloud Computing, from Cloud Connect 2010

Here’s a keynote speech from Brian Berger of Wave Systems and the Trusted Computing Group talking on issues surrounding Trusted Cloud Computing, from Cloud Connect 2010.

July 2010 | Podcasts/Webcasts | Add to Briefcase