InvestorsHub Logo

awk

Followers 88
Posts 7081
Boards Moderated 2
Alias Born 07/21/2003

awk

Re: internet post# 204697

Tuesday, 01/11/2011 3:27:14 PM

Tuesday, January 11, 2011 3:27:14 PM

Post# of 249280
Links to all Wave/TCG videos…


Updated Video Links

From Youtube's "Wave Systems" channel
http://www.youtube.com/user/WaveSystems#p/u


Featuring Mr. Sprague, "Leveraging Hardware Security in 350 Million Platforms" gives viewers a brief overview of Trusted Computing, from the history behind the TCG, to an introduction of both the TPM and SED as embedded forms of hardware security, designed by the security and PC industry to counter the vulnerabilities of software security





The second video, "Trusted Computing: Establishing Device Identity" evaluates how TPMs act as the foundation for device identity, ensuring that only known machines are allowed network access. The TPM is a highly secure "container" for user and device keys, providing device identity much the same way as a SIM chip does on mobile phone networks.





The third video in the series, "Trusted Computing: Employing Hardware Encryption" introduces viewers to hardware-based disk encryption. Mr. Sprague addresses the impact of new legislation mandating encryption and points to performance differences between software and hardware full-disk encryption (FDE), along with deployment considerations.





In Trusted Computing: "Considerations for Deploying in the Enterprise" Wave Systems’ President and CEO Steven Sprague argues that, for as powerful as Trusted Computing security is, to extract its true value, IT must have and use the right management tools. By turning on and managing the Trusted Platform Modules (TPM) on employee PCs, IT can add greater security to organizations’ virtual private networks. With self-encrypting drives (SEDs), management software is needed to configure each drive, set security policies and perform event logging to prove encryption was turned on should a laptop become lost or stolen.





In "Trusted Computing: Deploying in a Mixed Environment" Mr. Sprague addresses a common question: How should we proceed when Trusted Computing security isn’t on every PC in our enterprise?” Keys and certificates should be stored in TPMs wherever possible and selecting an SED should become standard practice for all new PC purchases. In the meantime, IT should evaluate the best transitional approaches, including deployment of Microsoft BitLocker to encrypt data.





There is a long history of the government becoming a first adopter and advocate for technology that serves the greater public good. Look no farther than the development of the Internet as proof. In "Trusted Computing: Government Adoption" Mr. Sprague illustrates how the government is again playing a leadership role, as evidenced by the Department of Defense mandate to include TPMs on all new laptops.





In the series finale "Trusted Computing: What the Future Looks Like" Mr. Sprague cites precedents of how the industry’s decision to embed technology transformed the way we compute. Ethernet transformed networking; USB forever changed the perception of peripherals. The infrastructure is in place for the TPM to act as the subscriber management system for all Cloud and Web-based services.





Trusted Computing: Considerations for Managing Hardware Encryption



ERAS for Bitlocker V2



Wave for Microsoft Direct Access



id.wave.com Product Demonstration:
Tying a Trusted Platform Module to OpenID




From Youtube's "Trusted Computing" channel
http://www.youtube.com/user/TrustedComputing


NSA Tusted Computing Conference, September 2010
Dr.Michael Willett talks about the current and future adoption of trusted computing technologies



NSA Tusted Computing Conference, September 2010
Dr. Robert Thibadeau on Device Authentication




NSA's first Trusted Computing Conference and Exposition (25:00)
http://www.nsa.gov/ia/Media_Center/index.shtml

.
Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.