Automate to Win: The Business Case for Standards-based Security


Thank you for joining us for the April 26, 2011 webinar about the TNC network security architecture, open standards created by the Trusted Computing Group, and the products that have implemented those standards.

Network Security Webcast Racks of network security gear. Megabytes of logs. Thousands of new attack attempts each day. Vendors knocking down the door with their latest silver bullet product. How can an information security manager deal with all of this?

You need a security architecture that automates routine tasks. An open architecture based on standards and best practices, integrating all your products together into a single, cohesive whole. Come learn about this architecture: the Trusted Network Connect (TNC) architecture from the Trusted Computing Group.
TNC is a modular architecture that lets you start with the products you have and assemble them to solve the problems you need to solve. By integrating products together into a cohesive “solution”, an attack detected by one system can be acted on by another. You can easily add and integrate new products as necessary to address new problems. And you can use products from a wide and growing variety of vendors, including several open source implementations, ending single-vendor lockin.

During this webinar, you’ll learn about the TNC architecture and standards from an expert: Steve Hanna, the co-chair of the TNC Work Group. Then you’ll hear from a customer who’s using TNC standards such as IF-MAP to secure his network. You’ll learn about how TNC works in the real world, what the benefits and drawbacks are, and what is in store for the future. If you have any questions, you can submit them and get them answered by the experts.

Become an expert in how to “do more with less”. View the TNC webinar!

Click here to view the presentation in PowerPoint format.

Automate to Win: The Business Case for Standards-based Network Security from Trusted Computing Group on Vimeo.