Trusted Computing Group Certifies Three IF-MAP Servers for Security Automation, Correlation of Metadata

Date Published: November, 09, 2012

The amount of metadata generated by all the devices on the network is exploding. Security automation has become a big category and way to coordinate all this data so networks become smarter, even self-healing, while protecting critical data, systems and the network itself. Trusted Computing Group created its IF-MAP (Metadata Access Protocol) to enable this coordination.

IF-MAP is a standard client/server protocol for accessing a Metadata Access Point (MAP). The MAP server has a database for storing information about network security events and objects (users, devices, etc.); it acts as a central clearinghouse for information that infrastructure devices can act on. The IF-MAP protocol defines a powerful publish/subscribe/search mechanism and an extensible set of identifiers and data types. MAP clients can publish metadata and/or consume metadata published by other clients.

A number of companies now have developed MAP servers based on the TCG specifications. Uses for these servers include:

  • Network infrastructure systems (routers, switches and the like)
  • Network security systems, such as firewalls, intrusion detection/prevention, endpoint scanning and event management systems (SEIM)
  • RADIUS and Active Directory authentication
  • Asset management, ERP, CRM, HR and similar applications

This week, three organizations announced they’ve passed rigorous testing via TCG’s certification program to certify their IF-MAP servers. Infoblox certified its Orchestration Server (IBOS). Trust@FHH, part of FH-Hannover, certified its irond and omapd, another open source project, certified its IF-MAP server.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More