Demos, Demos Everywhere! Here at RSA Conference 2014, TCG Members Solve Big Security Problems

Date Published: February, 01, 2014

Here today at the IT security industry’s big confab, members of the Trusted Computing Group are showing how deeply its concepts, including the root of trust, have extended into enterprise computing. In Room 2018 of Moscone West, 19 companies will participate in 12 demos, most of which are new to RSA attendees and involve readily available products and solutions, including open source options.

These demos are part of the TCG’s association session, 10 a.m. – 2 p.m., which includes panels on endpoint compliance and security automation, the TPM and mobile security. Industry analysts from Jon Oltsik, ESG; Vic Wheatman, SecurityCurrent; Gal Sphantzer, SANS and independent consultant; and Paul Roberts,SecurityLedger.com headline panels with participants from Boeing, DMI, Intel, JW Secure, Juniper Networks, Microsoft, Mobile Active Defense, and NIST to address endpoint compliance and security automation, the TPM and mobile security.

Reacting to data breach issues, four demos, created by teams from Intel, WinMagic and HP; Samsung and Wave; WinMagic and Seagate; and Absolute and Seagate address the growing use of self-encrypting drives, including solid-state drives, and their management in the enterprise. Pre-boot authentication, SED set-up, breach protection and other SED benefits will be shown.
Mobile security continues to be a critical issue, and TCG members DMI, Juniper Networks, JW Secure, Microsoft and Trustonic show a range of capabilities including BYOD security, enabling the TPM in a Trusted Execution Environment, and automating mobile device security.

Also in the mobile mode, a group that includes Decoit GmbH, Trust@HSH and University of Applies Sciences Rapperswill implements TCG TNC specifications with open source support for BYOD security.

Intel demonstrates an example of a TPM Software Stack for the TPM 2.0, a system API that accesses key TPM functionality and shows commands being sent to and from a simulator.

Industrial control systems security issues continue to headline the news. Asguard Networks and Juniper Networks demonstrate dynamic protection for critical infrastructure networks connecting with enterprise and public networks, using TCG IF-MAP.

The TPM features in several demos, including using the widely available and cost-efficient TPM as a virtual smart card and employing the TPM in increasingly vulnerable embedded systems.

The complete association session guide is available here.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More