New Protocol Improves Interaction among Networked Devices and Applications
"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices."
Full Computing Now Article Available Here.
TCG Architect’s Guides
TCG has published a new series of architect's guides to do just that - provide step-by-step blueprints with examples and tips.
Introduction to TCG: Training Videos
The Open Security Training Team has developed coursework as an introduction to Trusted Computing.
Protect Your Data and Enhance Security with Trusted Platform Modules (TPM)
View the latest infographic that shows the many benefits and problems solved when implementing the Trusted Platform Module (TPM)
Where Trust Begins Infographic
Latest TCG infographic on protecting the connected ecosystem.
To enhance your experience, please download the free Adobe Flash Player
Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.