News Focus
News Focus
icon url

TonyMcFadden

08/24/03 2:30 AM

#7420 RE: barge #7416

It's nice to see a) Intel so concerned about security and b)even the big guys making silly mistakes...

Winter 2003's SQL Slammer virus cost companies millions—perhaps billions—of dollars. And although it was confined mainly to servers, it demonstrated a critical weakness of information security: If you want to protect your data, you must make sure your business systems are state-of-the-art, including client PCs.



http://www.intel.com/ebusiness/upgrade/security.htm?iid=Homepage+ads_upgrade_security&

I thought we were coming up to winter 2003...or do they know something about an upcoming SQL slammer virus that they shouldn't...
icon url

Doma

08/24/03 4:58 AM

#7421 RE: barge #7416

Barge....Wave's all over Intel's "UPGRADE" campaign!!
If you follow the Upgrade links on Intel's site you
come to this.......

A UBIQUITOUS STANDARD FOR AFFORDABLE SECURITY(TCG)

Barge note the focus on Ubiquitous & Affordable..:)
As soon as Wave's Key Loading Servers are in place
in the TCG manufacturing process,ALL TPM's will be
E.K loaded.....it's part of the TCG Spec going forward.

In reply to: Doma who wrote msg# 4726 Date:8/7/2003 5:55:31 PM
Post #of 7419

A Ubiquitous Standard for Affordable Security.


Intel is also working with leadingdevelopers and security solution providers(Edit.Wave) throughout the world,to help establish the TCG specification as a ubiquitous, stan-dards-based foundation for affordable security. As support contin-ues to grow, a deployed base of TCG-compliant platforms willdeliver increasing benefits for businesses that are working toincrease security while containing total costs.E n t e r p r i s e S e c u r i t y a n d t h e P CI n f r a s t r u c t u r e913"The Coming Age of Client Security: Top Managers Realize They Have to Lock Downthe Point of Entry", Roger L. Kay, IDC, 2003. For more information, visit the IBM ClientSecurity Web site at: www.pc.ibm.com/us/security/Trusted DomainsTCG ComplementsX.509IPSECIKEVPNPKISmartcardBiometricsS-MIMESSLTrusted ComputingGroupSpecificationStandardsTechnologyProductsServicesOperating SystemSystem SoftwareSystem HardwareBIOSTPM

Eliminate Old At-Risk PCs and Servers that cannot handlebackground security tasks--such as encryption and virusscanning--without hampering productivity. When upgradingPCs, ensure sufficient performance headroom for both yoursecurity and your productivity roadmap, and take advantage ofnew security-hardened platforms. Security benefits can berealized immediately, and will continue to accrue as softwaredevelopers increase their focus on TCG-based security.