TCG has published a series of architect’s guides that provide step-by-step blueprints with examples and tips. In each of the guides, companies worldwide have built on TCG’s specifications to provide tools that provide security. Now those in the trenches can learn how to turn on and use powerful trust-based solutions – and in many cases, they can use their existing equipment and infrastructure.
Provides a framework for mobile security based on industry-standard TNC technologies from the Trusted Computing Group. Network designers can use this as a starting point for their own deployment, and can see best practices learned from over five years of real-world deployment of network access control in organizational networks.
TCG standards provide increased security for servers, desktop computers, portable devices, data at rest and in motion, and the network, as well as weak links in network security such as printers and other unmanaged devices. The 4 steps to BYOD security identified are: 1) Continuous Assessment, 2) Risk Reduction, 3) Access Control and 4) Monitoring and Response.
Comply to Connect is a standards-based approach to managing access to corporate networks, both from within and without, on multiple devices as long as the health and state of the devices can be verified. Comply to Connect solutions allow an organization to set policies that define granular access to resources, and enable devices and users to demonstrate ongoing compliance with those policies.
Security automation enables network and security systems to provide dynamic, responsive protection with automated handling of routine security tasks, allowing administrators to focus on critical areas such as threat analysis and policy development. This streamlined approach to enterprise security improves efficiency and reduces cost, and enhances an organization’s ability to monitor and respond to increasing and targeted network attacks. This guide shows enterprise security architects how they can design and deploy successful automated security solutions based on the open TNC architecture and standards along with interoperable compliance establishment through SCAP.
Aberdeen’s analysis of 41 companies with current deployments involving a hardware root of trust – either trusted platform modules (TPMs) or self-encrypting drives (SEDs) – and comparison with 86 companies who did not shows that companies deploying hardware roots of trust realized a cost advantage of more than $80 per endpoint per year, in addition to enhanced security and compliance and a generally transparent end-user experience.
In this webcast, you will learn how to embrace BYOD while securing corporate data, how to implement a comply-to-connect strategy and how self-encrypting drives can keep you clear from costly data breaches. Duration is 60 minutes.
The Open Security Training Team has developed coursework as an introduction to Trusted Computing. View the full video series or coursework.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.