New Protocol Improves Interaction among Networked Devices and Applications
"IF-MAP is Facebook for endpoint devices," said Matt Webster, product management director at Lumeta, which developed the IF-MAP specification. "As attacks become more complex, you need multiple systems within your security architecture for protection. IF-MAP allows these security products to pool that information together, which can be addressed by specialized devices."
Full Computing Now Article Available Here.
Introduction to TCG: Training Videos
The Open Security Training Team has developed coursework as an introduction to Trusted Computing.
TNC Global Professional Services Firm Case Study
One large global professional services organization has implemented TNC specifications to ensure corporate networks are protected.
Secure Embedded Platforms with Trusted Computing
Automotive and other systems in the internet of things must be protected.
Architect's Guide: ICS Security Using TNC Technology
This Architect’s Guide shows Information Technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security.
TCG Architect’s Guides
TCG has published a new series of architect's guides to do just that - provide step-by-step blueprints with examples and tips.
To enhance your experience, please download the free Adobe Flash Player
Trusted Computing enables more secure computing environments for a range of industries without compromising functional integrity, privacy, or individual rights.