InvestorsHub Logo
Followers 28
Posts 1761
Boards Moderated 1
Alias Born 07/24/2003

Re: None

Monday, 08/23/2010 5:54:29 PM

Monday, August 23, 2010 5:54:29 PM

Post# of 249195
Trusted Computing Group and Members to Demonstrate Trusted Computing in Action at Security Forum

Date Published: August 23, 2010

Trusted Computing Group and Members to Demonstrate Trusted Computing in Action at Security Forum; Sessions Include Discussion of Hardware- versus Software-Based Encryption at Leading Boston Healthcare Provider

Portland, Ore., Aug. 23, 2010 -- Trusted Computing Group (TCG) and member companies Juniper Networks and Wave Systems will demonstrate the trusted enterprise at Forrester's Security Forum 2010, Sept. 16-17, 2010 at the Westin Copley Place, Boston, Mass.

Boston Medical Center's Network Security Engineer Mark Mulvaney will speak at the event's Guest Executive Forum on "Encryption: Hardware or Software? Lessons from the Field" on Sept. 16, 3:00 - 3:30 p.m., based on the center's experiences with data protection.

Attendees can see Trusted Computing in action with today's widely available products in TCG's Booth #208.


Wave will demonstrate its EMBASSY® Client/Server software that provides policy-based access controls, centralized administration and proof of compliance when used with self-encrypting drives based on Trusted Computing Group's OPAL specification. The demo will include initialization, management and user authentication of a self-encrypting drive and password recovery.


Juniper Networks will demonstrate a day in the life of an enterprise enabled by TCG's Trusted Network Connect architecture, as implemented in the Juniper Networks Unified Access Control (UAC) solution for adaptive, identity-enabled network and application access control. Key elements include linking data leak prevention with network access based on the TCG IF-MAP specification; authentication and compliance to corporate policies; differentiated employee, guest worker and contractor access; and maintenance of employees' systems to ensure compliance with security policies.

About the Trusted Computing Group
The Trusted Computing Group (TCG) provides open standards that enable a safer computing environment across platforms and geographies. Benefits of Trusted Computing include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Organizations using built-in, widely available trusted hardware and applications reduce their total cost of ownership. TCG technologies also provide regulatory compliance that is based upon trustworthy hardware. More information and the organization's specifications and work groups are available at the Trusted Computing Group's website, www.trustedcomputinggroup.org.
Follow TCG on Twitter, on LinkedIn and on Facebook.

-- 30 --

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.