TCG’s Trusted Network Communications (TNC) work group has defined and released an open architecture and a growing set of standards for network security, providing interoperable end-to-end trust in multi-vendor environments across a wide variety of endpoints, network technologies, and policies. TNC enables endpoint compliance evaluation, intelligent policy decisions, dynamic security enforcement, and security automation between disparate networking and security systems.
TNC addresses today’s most significant security problems, providing a flexible, open architecture that adapts to changing circumstances without getting tied down to any one vendor. TNC-enabled technology improves ROI, enabling use of existing network equipment and best-of-breed products, and avoidance of vendor lock-in. Visibility and coordination contribute to efficient network management and security.
TNC’s open network security architecture and complete set of standards benefit from thorough technical review by security experts. For the strongest security, TNC can leverage the TPM for robust authentication, attestation, and compromise detection. Wide support exists for the TNC standards among commercial vendors, the open source community, and the IETF.
TNC can integrate with a TPM for secure authentication and attestation, addressing detection and mitigation of rootkits and other compromised software. TNC standards provide a communication foundation for securing embedded systems such as network equipment, automotive, and IoT solutions.
Lisa Lorenzin is a Principal Solutions Architect with Pulse Secure, specializing in security and mobility solutions, and co-chair of Trusted Network Communications, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles since 1994, with more than a decade of that focused on network and information security, and is currently concentrating on enterprise security including network segmentation, end-to-end identity-based access control, and integration of mobile security.
Atul Shah is a Principal IT Service Engineering Manager at Microsoft Corporation. With 15+ years of experience in IT security industry, he has been involved in several aspects of IT security from product development to managing core IT infrastructure services for Microsoft’s global business. Atul drove Microsoft’s End to End Trust initiative, which sought to create a safer, more trusted internet. His efforts include creating trusted mechanisms for evaluating and attesting to the state of the devices connecting to the internet, investigating and solving cloud related security, privacy and jurisdictional issues that impact businesses and consumers. Atul is a frequent public speaker on strategies for reducing Internet threats such as identity theft, improving device health and proactive protection strategies to reduce the risks of malware.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.