InvestorsHub Logo
Followers 3
Posts 555
Boards Moderated 0
Alias Born 07/31/2003

Re: None

Thursday, 11/16/2006 2:53:57 AM

Thursday, November 16, 2006 2:53:57 AM

Post# of 249238
http://www.dell.com/content/topics/global.aspx/power/en/power?c=us&cs=RC968571&l=en&s=he...

SPECIAL FEATURE SECTION: SECURITY

http://www.dell.com/downloads/global/power/ps4q06-20060431-CoverStory.pdf
Dell is committed to developing a highly scalable, standards based architecture and solutions for end-to-end security. As a result of Dell’s work with middleware, software, and virtualization providers
and strong alliances with partners who offer state-of-the-industry best practices, Dell™ hardware already integrates a variety of security features. For example, a Trusted Platform Module (TPM) is included
in many Dell client systems for organizations that require security solutions with multifactor authentication or hardware-backed secure storage of digital keys, certificates, and passwords.
Laying the foundation with industry standards
Dell has assumed a leadership role in vendor-neutral standards organizations such as the Trusted Computing Group (TCG). TCG is developing specifications for trusted computing and security technologies that are designed to make security inherent in every
aspect of the IT infrastructure as well as the overall management framework—including hardware components and software interface
specifications across a range of platforms and operating environments.2 For example, TCG specifications define, among other things, the standards for creating TPMs, which are microcontrollers incorporated into computing devices to provide hardware protection for security tasks and authentication information. Dell is also working with industry standards bodies such as the Distributed Management Task Force to define the various characteristics of security objects so these objects can fit into large management frameworks. This effort includes creating common information flow formats for issues such as identity management and vulnerability definitions. By defining and creating common information schemas, security objects and information can be shared among security solutions— allowing organizations the flexibility to choose the most appropriate application environment and management framework for their particular business needs. In addition, Dell is creating a federated repository model for flowing information outside the organization. This model, which also integrates into the management framework, can help ensure that electronic data interchange is protected.


---------------------------------------------------
Protecting Enterprise Assets
with Identity Management Solutions from Dell and IdentiPHI http://www.dell.com/downloads/global/power/ps4q06-20070155-IdentiPHI.pdf
------------------------------------------------------
Enhancing IT Security
with Trusted Computing Group Standards
http://www.dell.com/downloads/global/power/ps4q06-20070160-tcg.pdf

Dell includes TPMs and Wave Systems EMBASSY Trust Suite software on many Dell™ Latitude™ notebooks, Dell OptiPlex™ desktops, and Dell Precision™ workstations. Dell also anticipates eventually
incorporating TPM architectures on its servers and storage.

------------------------------------------


dude_danny

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.