Industry Data

New Protocol Improves Interaction among Networked Devices and Applications

 

"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices." 

 

Full Computing Now Article Available Here.

Solutions

  • TCG Architect’s Guides

    TCG has published a new series of architect's guides to do just that - provide step-by-step blueprints with examples and tips.

    Learn More

    Authentication

  • Introduction to TCG: Training Videos

    The Open Security Training Team has developed coursework as an introduction to Trusted Computing.

    Learn More

    Authentication

  • Protect Your Data and Enhance Security with Trusted Platform Modules (TPM)

    View the latest infographic that shows the many benefits and problems solved when implementing the Trusted Platform Module (TPM)

    Learn More

    Authentication


  • To enhance your experience, please download the free Adobe Flash Player

    Get Adobe Flash player

Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.

 

Applications

Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.