InvestorsHub Logo
Followers 31
Posts 1405
Boards Moderated 0
Alias Born 07/22/2003

Re: None

Friday, 02/10/2006 8:23:40 PM

Friday, February 10, 2006 8:23:40 PM

Post# of 249244
Letter from President
The Trusted Computing Group (TCG) continues to add to the diversity of its trusted capabilities. The Storage Work Group has recently released a Storage Use Cases Whitepaper and is expected to release a storage specification this summer. The use cases received good interest at the SNIA Security Summit on January 19, 2006 where they were presented. You can take a look at that presentation on the TCG Web site.

The TCG looks forward to RSA Conference every year. We hope you have a chance to visit with us about the TCG at either our Business Community Day on February 13, 2006 from 10am – 1pm titled the Secure Enterprise or at booth 1411 during the exhibition. We really enjoy the questions and quality interactions that we get at this show every year.

We also welcome the following new members: Applied Identity, Inc., Insight International Corp, Insyde Software Corp., Lexar Media, Inc., ViaSat, Inc., Dartmouth College, Western Digital, Trust Digital, Bluesocket Inc, Soliton Systems K.K. and Feature Integration Technology, Inc. We value the contributions and expertise each of these companies brings to the TCG.

Jim Ward, TCG Board President & Chair



TCG in the News
TCG's Storage Work Group is making giant strides in securing one of the enterprise's most important - and vulnerable - areas. This month, detailed use cases for trusted storage were published. TCG has been working closely with industry leaders in storage and with various related standards organizations and its efforts are detailed at: https://www.trustedcomputinggroup.org/groups/storage/Storage_Use_Case_
Whitepaper_v07.pdf

In a nutshell, the seven use cases outline:

·


Enrollment and connection: trusted relationship between the storage device
and the host

·


Protected storage: for storing sensitive data

·


Locking and encryption: mating a storage device and host; encrypting stored
data at rest

·


Logging: for forensic purposes

·


Cryptographic services: supporting a variety of security services

·


Authorizing storage device feature sets to hosts: for trusted and exclusive use

·


Secure download of firmware: trusting firmware upgrades

The group's open specification is anticipated for release by June of this year. It will cover each storage component, such as an individual hard drive or flash storage device. A trusted controller will manage the individual components of networked or array-based storage. Trusted storage will work in the trusted enterprise to further protect data.

TCG's Michael Willett of Seagate Research recently addressed the Storage Networking Industry Association about this topic. His slides are available at: https://www.trustedcomputinggroup.org/news/presentations/ SNIA_Security_Summit_2006.pdf

For more information, go to http://www.snia.org/security_summit or contact press@trustedcomputinggroup.org.



IT Experts Note Benefits, Momentum of Trusted Computing to
Secure the Enterprise
Several new white papers are available now to help the IT community assess the benefits and applications of Trusted Computing in the enterprise. Experts from Enterprise Strategies Group, Endpoint Technologies Associates and IDC have reviewed key usages and the status of deploying Trusted Computing in clients; these papers also address security needs and solutions for storage, servers, mobile systems and networks. Get these papers now at: https://www.trustedcomputinggroup.org/news/Industry_Data/



Trusted Computing Software Stack Specification
Available For Developers
TCG has just announced availability of the Trusted Computing Group Software Stack Specification, or TSS, version 1.2. This version builds on the previous one to enable development of applications that will take advantage of the many features of the Trusted Platform Module 1.2. These features include Direct Anonymous Attestation (DAA) and the ability to run and generate a new Attestation Identity Key (AIK); locality; delegation; non-volatile storage; optimized transport protection; and time stamping (for more information on TPM 1.2, please go to): https://www.trustedcomputinggroup.org/groups/tpm/TPM_1_2_Changes_final.pdf

Several TCG members will support developers with a TSS DLL. NTRU for example is offering a TSS 1.2 implementation and companies such as IBM and Wave Systems provide applications based on the specification.

Applications developed with the new TSS will maintain backward compatibility with those based on the earlier TSS. For more information or to download the specification, go to: https://www.trustedcomputinggroup.org/groups/software/



More Companies Join Effort to Secure Data and Systems
TCG continues to attract participation from computing industry leaders.
Insight International Corp, Applied Identity, Inc., Insyde Software Corp., Lexar Media, Inc., ViaSat, Inc., Dartmouth College, Western Digital, Trust Digital, Bluesocket Inc, Soliton Systems K.K. and Feature Integration Technology, Inc. have joined TCG in support of open industry architectures and Trusted Computing. TCG now has more than 125 members; for a complete list, go to: https://www.trustedcomputinggroup.org/about/members/

TCG's liaison program to foster research continues, and the organization is working closely with a number of industry organizations to ensure open communication and cooperation with complementary industry efforts.



TCG Members NTRU and Winbond team up for Trusted Clients
NTRU's Core TCG Software Stack (CTSS) was selected by Winbond for use with its SafeKeeper* TPMs for desktop and notebook PCs. The CTSS provides the essential interface and services framework for applications that use the TPM on both Windows* and Linux operating systems. For more information, go to https://www.trustedcomputinggroup.org/news/press/member_releases/2005/
NTRU-Winbond_Press_Release_-_2005-12-12_-_FINAL.pdf



TCG to Present the Secure Enterprise at RSA Conference
On Monday, February 13, 2006 from 10:00am - 1:00pm, members of the Trusted Computing Group, the industry's standard for enabling trustworthy computing through connected products, will present The Secure Enterprise.

Technologists from Intel, Juniper Networks, Lenovo, Meetinghouse Data Communications, Seagate Technology and Wave Systems will discuss key concepts of the Trusted Computing architecture and its implementation across diverse products and technologies, including an overview of the Trusted Platforms, usage scenarios, Trusted Computing in wired and wireless environments, securing endpoints, and privacy and control options.

This session is open to all RSA Conference and Expo attendees for no additional cost. Please visit the Trusted Computing Group at Booth 1411 on the Exhibition Floor for demonstrations of trusted computing in action.








Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.