Industry Data

New Protocol Improves Interaction among Networked Devices and Applications

 

"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices." 

 

Full Computing Now Article Available Here.

Solutions

  • TCG Architect’s Guides

    TCG has published a new series of architect's guides to do just that - provide step-by-step blueprints with examples and tips.

    Learn More

    Authentication

  • Introduction to TCG: Training Videos

    The Open Security Training Team has developed coursework as an introduction to Trusted Computing.

    Learn More

    Authentication

  • Where Trust Begins Infographic

    Latest TCG infographic on protecting the connected ecosystem.

    Learn More


  • To enhance your experience, please download the free Adobe Flash Player

    Get Adobe Flash player

Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.

 

Applications

Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.