Search Resources

Clear Search


Architects Guide: BYOD (Bring Your Own Device)

Companies and employees are increasingly exploring and embracing the concept of BYOD in the workplace. BYOD allows employees, partners, contractors, or guests to have an appropriate level of access to the enterprise network through their own mobile devices. The advantages are obvious: The company obtains increased productivity and possibly reduces equipment cost The user has the convenience of ... READ MORE

Industrial Control System (ICS) Security Using TNC Technology

This webcast, based on TCG's Architect’s Guide, shows information technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security as specified in ISA 99 (now IEC 62443) and ISA 100.15. Attendees heard from leading ICS experts regarding these standards and how IT and control system executives and architects can implement a... READ MORE

Architects Guide: IoT Security

Every day, more things are connected to networks. These range from industrial machines to home appliances to vehicles and billions of sensors. Data collected from these sensors and devices allows individuals and businesses to make better decisions and take advantage of new products and services. But, every new device that connects to a network is potentially instantly exposed to viruses, malw... READ MORE

Architects Guide: ICS Security Using TNC Technology

Industrial Control Systems (ICSs) are increasingly being connected to networks and exposed to viruses, malware, and attacks that affect other network-connected systems. As a result, many standards organizations including the International Society of Automation (ISA), the International Electrotechnical Commission (IEC), and the Trusted Computing Group (TCG) [as well as the Internet Engineering Task... READ MORE

Architect's Guide: Cybersecurity

Enterprises are under attack — and the frequency and severity of the resulting breaches continues to escalate. No one is immune, and the odds of success remain in attackers’ favor. A single employee, clicking on a link in a phishing email, can be all an attacker needs to establish a beachhead inside an enterprise network that can be used to steal secrets or sabotage systems. This Architect’s... READ MORE

Data Security Using TCG Self-Encrypting Drive Technology

This architect’s guide focuses on the deployment of available SED products in the enterprise (both laptops and the data center), highlighting best practices for implementation in a variety of case studies. Architects Guide Data Security Using TCG Self-Encrypting Drive Technology... READ MORE

TCG Data Security Architects Guide

With increasing global regulations for data security and the increasing consequences of non-compliance from privacy protection and breach notification laws, enterprises must take the appropriate steps to protect the data entrusted to them by others as well as their own proprietary corporate information. Self-encrypting drives (SEDs) provide protection for data in storage and meet compliance crite... READ MORE

TCG Security Automation Architects Guide

Security automation enables network and security systems to provide dynamic, responsive protection with automated handling of routine security tasks, allowing administrators to focus on critical areas such as threat analysis and policy development. This streamlined approach to enterprise security improves efficiency and reduces cost, and enhances an organization's ability to monitor and respond to... READ MORE

TCG Comply to Connect Architect’s Guide

Comply to Connect is a standards-based approach to managing access to corporate networks, both from within and with¬out, on multiple devices as long as the health and state of the devices can be verified. Just as risk is not a binary (yes or no) concept, neither is compli­ance. Comply to Connect solutions allow an organization to set policies that define granular access to resources, and enable ... READ MORE

TCG Architect’s Guides

TCG has published a new series of architect's guides to do just that - provide step-by-step blueprints with examples and tips. Topics for the first three in the series include Mobile Security Using TNC Technology, BYOD Security Using TCG Technology, and Comply to Connect Using TNC Technology. In each case, companies worldwide have built on TCG's specifications to provide tools that provide securi... READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.