Learn to Secure Network Equipment Against Attacks and Malware at May 16 Trusted Computing Group (TCG) Webcast with Cisco Systems, Inc., Huawei and Infineon

Date Published: April, 26, 2018

PORTLAND, Ore., April 26, 2018Trusted Computing Group (TCG) experts Bill Sulzen, Cisco Systems, Inc.; Michael Eckel, Huawei; and Steve Hanna, Infineon; will provide a tutorial on how to secure network equipment against sophisticated threats in a webcast Wednesday, May 16, 1:00 p.m. Eastern Daylight Time/10:00 a.m. Pacific Daylight Time.

Much effort has been put into securing data at rest and in transit. But routers, switches and firewalls remain vulnerable to attacks that can compromise these devices, resulting in access to networked data, unsafe network operations and firmware implants that can disable networks.

The webcast will outline key network equipment vulnerabilities and address specific steps to embed network equipment with foundational security, based on a root of trust. Speakers will advise attendees on key requirements and considerations for designing more secure routers, switches and firewalls and how to harden them against attacks, including malware.

TCG recently released guidance for securing network equipment. Recommendations include:

  • Devices should use a TPM as a hardware-based root of trust for secure storage of boot state and hashes and cryptographic secrets
  • Devices should provide a cryptographic device identity based on IEEE 802.1AR and use the TPM to protect keys. Cryptographic identity can provide a reliable way to identify remote devices for applications involving device management, configuration and authentication
  • The TPM can be used to protect confidential data, such as VPN keys in network equipment
  • TPM-based attestation can offer assurance to the integrity of software running on network equipment
  • Use of the TPM’s random number generator can enhance the strength of cryptographic protocols by providing additional entropy

These recommendations will be described in context with more details during the webcast. Register here for the webcast (http://ow.ly/6asT30japVt).

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.  More information is available at www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More