Circle of Trust

Date Published: February, 01, 2013

Join the Circle of Trust

For more information on joining the Trusted Computing Group as a corporate or liaison member, please visit: Join Now!

How-To Architect’s Guides:

TCG has published a series of architect’s guides that provide step-by-step blueprints with examples and tips. In each of the guides, companies worldwide have built on TCG’s specifications to provide tools that provide security. Now those in the trenches can learn how to turn on and use powerful trust-based solutions – and in many cases, they can use their existing equipment and infrastructure.

Topic Areas:

Mobile Security Using TNC Technology

Provides a framework for mobile security based on industry-standard TNC technologies from the Trusted Computing Group. Network designers can use this as a starting point for their own deployment, and can see best practices learned from over five years of real-world deployment of network access control in organizational networks.

BYOD (Bring Your Own Device) Using TCG Technology

TCG standards provide increased security for servers, desktop computers, portable devices, data at rest and in motion, and the network, as well as weak links in network security such as printers and other unmanaged devices.  The 4 steps to BYOD security identified are: 1) Continuous Assessment, 2) Risk Reduction, 3) Access Control and 4) Monitoring and Response. 

Comply to Connect

Comply to Connect is a standards-based approach to managing access to corporate networks, both from within and without, on multiple devices as long as the health and state of the devices can be verified. Comply to Connect solutions allow an organization to set policies that define granular access to resources, and enable devices and users to demonstrate ongoing compliance with those policies.

Security Automation

Security automation enables network and security systems to provide dynamic, responsive protection with automated handling of routine security tasks, allowing administrators to focus on critical areas such as threat analysis and policy development. This streamlined approach to enterprise security improves efficiency and reduces cost, and enhances an organization’s ability to monitor and respond to increasing and targeted network attacks.  This guide shows enterprise security architects how they can design and deploy successful automated security solutions based on the open TNC architecture and standards along with interoperable compliance establishment through SCAP.

Videos – From RSA Conference 2013:

Panel: Advanced Persistent Threads and NIST SP800-147 and NIST SP800-155

Panel: Network Security, Critical Infrastructure, BYOD

Panel: Protecting Content from Unauthorized Access

Keynote: Top 10 Priorities in IT Security for the County of Los Angeles and the Importance of Industry Standards

Additional Reference Materials:

Aberdeen Research Report: Endpoint Security: Hardware Roots of Trust

Aberdeen’s analysis of 41 companies with current deployments involving a hardware root of trust – either trusted platform modules (TPMs) or self-encrypting drives (SEDs) – and comparison with 86 companies who did not shows that companies deploying hardware roots of trust realized a cost advantage of more than $80 per endpoint per year, in addition to enhanced security and compliance and a generally transparent end-user experience.

ComputerWorld Webcast: How to Keep Data Secure: New Strategies from the TCG

In this webcast, you will learn how to embrace BYOD while securing corporate data, how to implement a comply-to-connect strategy and how self-encrypting drives can keep you clear from costly data breaches. Duration is 60 minutes.

Videos: Introduction to Trusted Computing

The Open Security Training Team has developed coursework as an introduction to Trusted Computing. View the full video series or coursework.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more