Companies and employees are increasingly exploring and embracing the concept of BYOD in the workplace. BYOD allows employees, partners, contractors, or guests to have an appropriate level of access to the enterprise network through their own mobile devices. The advantages are obvious:
The company obtains increased productivity and possibly reduces equipment cost
The user has the convenience of ... READ MORE
This webcast, based on TCG's Architect’s Guide, shows information technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security as specified in ISA 99 (now IEC 62443) and ISA 100.15.
Attendees heard from leading ICS experts regarding these standards and how IT and control system executives and architects can implement a... READ MORE
Every day, more things are connected to networks. These range from industrial machines to home appliances to vehicles and billions of sensors.
Data collected from these sensors and devices allows individuals and businesses to make better decisions and take advantage of new products and services. But, every new device that connects to a network is potentially instantly exposed to viruses, malw... READ MORE
Industrial Control Systems (ICSs) are increasingly being connected to networks and exposed to viruses, malware, and attacks that affect other network-connected systems.
As a result, many standards organizations including the International Society of Automation (ISA), the International Electrotechnical Commission (IEC), and the Trusted Computing Group (TCG) [as well as the Internet Engineering Task... READ MORE
Enterprises are under attack — and the frequency and severity of the resulting breaches continues to escalate.
No one is immune, and the odds of success remain in attackers’ favor. A single employee, clicking on a link in a phishing email, can be all an attacker needs to establish a beachhead inside an enterprise network that can be used to steal secrets or sabotage systems. This Architect’s... READ MORE
This architect’s guide focuses on the deployment of available SED products in the enterprise (both laptops and the data center), highlighting best practices for implementation in a variety of case studies.
Architects Guide Data Security Using TCG Self-Encrypting Drive Technology... READ MORE
With increasing global regulations for data security and the increasing consequences of non-compliance from privacy protection and breach notification laws, enterprises must take the appropriate steps to protect the data entrusted to them by others as well as their own proprietary corporate information.
Self-encrypting drives (SEDs) provide protection for data in storage and meet compliance crite... READ MORE
Security automation enables network and security systems to provide dynamic, responsive protection with automated handling of routine security tasks, allowing administrators to focus on critical areas such as threat analysis and policy development. This streamlined approach to enterprise security improves efficiency and reduces cost, and enhances an organization's ability to monitor and respond to... READ MORE
For more information on joining the Trusted Computing Group as a corporate or liaison member, please visit: Join Now!
How-To Architect's Guides:
TCG has published a series of architect's guides that provide step-by-step blueprints with examples and tips. In each of the guides, companies worldwide have built on TCG's specifications to provide tools that provide security. Now those in the trenches ... READ MORE
Comply to Connect is a standards-based approach to managing access to corporate networks, both from within and with¬out, on multiple devices as long as the health and state of the devices can be verified.
Just as risk is not a binary (yes or no) concept, neither is compliance. Comply to Connect solutions allow an organization to set policies that define granular access to resources, and enable ... READ MORE