InvestorsHub Logo
Followers 86
Posts 6674
Boards Moderated 0
Alias Born 07/23/2003

Re: dig space post# 227822

Wednesday, 10/17/2012 1:11:24 AM

Wednesday, October 17, 2012 1:11:24 AM

Post# of 249232
DigSpace--The predatory politics of the Trusted Computing Group is responsible for the Slog...NOT Wave.

The Slog properly understood is the direct result of the mincing half steps of the very politicized Standards Group referred to as the Trusted Computing Group. Does anyone really believe that Wave could have jumped the alligator infested queue of the TCG and struck revenue gushing deals on its own?

TCG leads, Wave follows! Wave was never in a position to open up the Trusted Computing market single-handedly with a sales team trained in sales techniques inspired by Jin Yong martial arts. GM, BASF, and BP could not have possibly been exclusive Wave contracts made in isolation from Microsoft and other mega OEMs of TCG.

Has Dell been subsidizing Wave all these years or has it been the TCG?

How could anyone who follows this space with any regularity not immediately recognize that Windows 8 is D-Day for Trusted Computing?

These boards get caught up all to often in the minutiae of technology, ledger books, management competence and yet completely gloss over the obvious fact that Windows 8 is a pure Enterprise Trusted Computing Play and Windows 8 RT is a Pure Consumer Trusted Computing Play.

Oh and yes I can already hear the intellectual mavens and dunces already whining, "Hey, barge, maybe Wave is going to be bypassed by this revolution. Can you PROVE it to me otherwise?"

The answer to the whiners is in the Dots, the big pithy swelling Dots accumulated over the years by our very best Dot collectors.

For example, here's one hell of a Dot by Wavesurfer. Instead of kvetching he shares his due diligence with the community.

http://www.forbes.com/sites/tomcoughlin/2012/10/15/creating-security-from-the-inside-out/

10/15/2012 @ 1:21AM |241 views

Creating Security from the Inside Out

The Trusted Computing Group Storage Technical Working Group has been leading the digital storage industry in the introduction of storage security built into individual storage devices. This group has created standard for encrypted storage devices for consumer as well as enterprise applications with its OPAL and now enterprise secure-storage device standards. The TCG standards cover various Self Encrypted Drives (SEDs) such as hard disk drives (HDDs) and solid state drives (SSDs).

Secure storage devices with on-board encryption are available from many vendors today, including all hard disk manufacturers (Seagate Technology, Western Digital and Toshiba) as well as major SSD manufacturers such as Intel, Micron, and Samsung. Coughlin Associates expects that all solid state drives will use on-board encryption within the next few years since it allows rapid content erasure by overwriting the encryption key (see the 2011 Self Encrypted Drive Market and Technology Report, www.tomcoughlin.com/techpapers.htm). Likewise this technology is also expected to become more common on regular HDDs because of better data security and also rapid crypto-erase of data.

The Trusted Computing Group, as well as leading companies in the storage devices security industry, have initiated moves to move encrypted security from the realm of individual storage devices to network storage. The TCG announced in early October that it is discussing integration of its Trusted Network Connect (TNC) architecture with network security with the widely used Security Content Automation Protocol (SCAP), developed by the U.S. Commerce Department’s National Institute of Standards and Technology (NIST).

The Microsoft Windows 8 operating system will bring the Trusted Platform Modules (TPMs, the basis of storage device-based encryption security as well as additional security features) to wider use for enterprise applications. With advances in malware detection, access control and encryption, Windows 8 will provide support for the hardening of BIOS standards and native support of SEDs by the operating system. All Windows 8 devices will include a TPM and optionally SED support.

According to the TCG web site, “The Trusted Network Connect (TNC) Work Group has defined and released an open architecture and a growing set of standards for endpoint integrity. The TNC architecture enables network operators to enforce policies regarding endpoint integrity at or after network connection. The standards ensure multi-vendor interoperability across a wide variety of endpoints, network technologies, and policies.”

Wave Systems, a pioneer in enabling SEDs, is furthering network support of self-encrypted storage devices. In August the company announced cloud-based management for SEDs with its Wave Cloud service. This subscription service offers cloud-based management of enterprise-wide SEDs. Thus encrypted drive key management can be offered as an on-line service, eliminated the cost and complexity of implementing key management for laptops and other storage devices. A service like this makes enterprise class key management available even to small and medium size companies and will increase the drive to implement and manage self-encrypting drives.

SEDs will enable a level of security that has eluded many companies and organizations in the past. The use of TPMs allows many boot level security features to be implemented including support of SEDs. Integrating the TNC architecture with widely used security protocols will increase the value still further. The wide-spread use of these TPMs in Windows 8 will make sure that the next generation of Windows enterprise products include many innovative storage features.

Finally by making key management a cloud-based service, SED security management for an entire enterprise is available even to the smallest company and organization. The efforts of the Trusted Computing Group are truly creating security from the inside out.

WAVEs EMBASSY = THE COMMON DENOMINATOR "SWISS" DEFACTO PLATFORM FOR TRUSTED WEB SERVICES

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.