InvestorsHub Logo
icon url

mdt

05/02/07 2:20 PM

#143773 RE: RootOfTrust #143772

the embassy listing wasn't anything new, it was just nice to see again. i went into the notebooks offered at the federal level and then DOD offerings and all the notebooks listed

http://www.dell.com/content/topics/global.aspx/solutions/pub/security?c=us&cs=fedportal&l=en...

although they list Identiphi as well

IDENTITY AND DATA SECURITY


Managing access to sensitive government data is the most critical link in your security chain. By using Dell OptiPlex desktops, Dell PrecisionTM workstations and Latitude notebooks, you can enjoy a number of standard security features built into the box, as well as optional hardware and software from industry leaders to help you create a multi-point authentication strategyand help protect your agency.

BIOS-enabled security adds a layer of protection on top of your operating system passwords, tying additional password protection to system startups and pre-operating system configuration. Take data security to the next level with Smart Card tools, which combine passwords and access cards to provide a robust security solution. In tandem with Trusted Platform Module (TPM) technology, this can minimize network and system breaches.

Because user identity and data security are absolutely vital to protecting your federal initiatives, Dell also offers bio-metric devices to positively identify users through unique physical characteristics. Dell's range of security software supports this combination of security initiatives, ensuring ease of use and a step towards FISMA compliance.

User Authentication
Federal agencies and departments must know who is accessing sensitive information at all times. User authentication relies on passwords or external identification devices to verify access to the system and network data. Government organizations are a common target for hackers, and passwords alone are often not effective enough to ensure accurate authentication in sensitive IT environments.

For robust identity management, Dell has partnered with developers of leading security packages, such as the IdentiPHI Enterprise Security Suite. This versatile software suite provides encryption and single sign-on to applications and network resources. It works with Smart Cards, biometrics and token devices, and Dell offers the associated hardware and professional services for assessment and deployment.

Smart Cards combine user credentials stored in a security object (the card) with security knowledge (a password) to create a two-factor security process you can count on. Smart Card technology can be easily integrated into your existing technology with Smart Card keyboard readers, or enhanced to include biometrics technology, such as fingerprint readers. This helps ensure that only authorized users are accessing your data.

System Authentication
Dell's system authentication security solutions include the Trusted Platform Module (TPM), which is standard on Dell's D-family of Latitude notebooks, Dell OptiPlex desktops and select Dell Precision Workstations. TPM is an industry-wide effort to standardize trusted PC platforms, utilizing a chip embedded in a system that identifies that computer as an authorized system. This cutting-edge technology helps prevent attacks from hackers looking to capture passwords and encryption keys to your data. Many Dell partners, such as IdentiPHI and Wave Systems, also provide solutions that are compatible with TPM.

File and Folder Encryption
Protecting sensitive data as well as the privacy rights of citizens are top security concerns. Whether in transit over the network or at rest on your system, encryption helps secure data with a digital signature, minimizing its potential to be altered or accessed by unauthorized users internally or externally. Data encryption technologies help secure your data by converting files and text into "cipher text" that can only be decoded to its original form with a valid password or encryption key (often managed by Smart Cards or TPM). Encrypting network traffic usually involves the use of a Virtual Private Network for remote connections. Dell offers industry-leading encryption solutions such as IdentiPHI and EncryptX to help keep your most critical data secure. These complete encryption solutions let you manage who can decode data stored on your network, with assigned privileges and best-in-class encryption techniques.

Data Recovery
Local Recovery is a client-based, stand-alone backup and recovery application developed by Altiris and available on Dell OptiPlex desktops, Latitude notebooks and Dell Precision Workstations. Local Recovery helps protect your operating systems, applications and data from unintentional changes, accidental deletion, virus attacks and corrupted files. Once activated, periodic snapshots of your data are taken automatically, working seamlessly and unobtrusively to backup your data for protection
icon url

Weby

05/02/07 2:40 PM

#143777 RE: RootOfTrust #143772

This is a very small section of a very complicated document explaining TPMs in MSFt Vista and Longhorn Server to come.

I'm posting this section because 1. The document is primarily about local control of machines and doesn't get to group installations -- and issues of enterprise key management, and DRM until late in the chapter. Following the section posted, around page 62 of the pdf. There is an enlightening discussion on encryption and what is bugging NIST (I'm assuming this argument over the nature of "unbreakable" encryption is part of the Dartt-NIST conflict over certification for Seagate. ) In the shortest sense, The document indicates to me that...Wave remains the leader in utilization of TPM keys, but the topic gets more complex all the time. It should be noted that this book, like all books, is dated. With the Seagate development Wave has moved away from the OS and moved the use of the TPM to pre-boot changing the nature of the conflict between Wave and MSFT. Lots of new stuff to understand, integrate and argue about. It is worthy of note however that the author acknowledges Wave's role first in the Third Party Applications section. Read on:

May1Sept's Link

http://www.syngress.com/book_catalog/431_Vista/sample.pdf

Third-Party Applications
Some third-party applications that rely on the TPM have already begun to emerge. Probably the best example of this is Wave Embassy Suites.This software package was originally developed to take advantage of version 1.1 TPM chips, but it now supports
version 1.2 chips as well.This is a very popular application that OEMs are deploying with devices they sell that include biometric hardware.The TPM will be utilized by applications such as this which enable strong biometric authentication measures by securing the biometric data that the application relies upon. Just as the TPM assists BitLocker Drive Encryption by sealing the VMK, the TPM can seal the user’s biometric data that the application is using. Another important application for TPM-enabled devices that will emerge will be remote access solutions. Given the strong device authentication possible with the TPM, you can be sure that remote access will appeal to a segment of the software market that turns toward implementing TPM support. In this way, you can think of the user needing an RSA SecureID or smart card to authenticate to the remote
access solution, and the device he or she is connecting from will also need to present its credentials using the TPM.This can help network administrators eliminate remote security breaches due solely to compromised user authentication tokens such as passwords, RSA SecureIDs, or smart cards. Now the attacker will also need to have the user’s laptop as well.
This is really only the tip of the iceberg as far as TPM-based applications go, however. Some implementations we are likely to see are as follows:
■ Users are provided with the ability to wrap the cryptographic keys they use for secure connections over the Internet, such as logging into their bank accounts via a Web browser and using secure e-mail applications.
■ Web servers can use the TPM’s sealing functionality to provide assurance to connecting nodes that they are trustworthy, including assurance that the
server-side software and settings are the same as when the node connected previously, when the trust relationship was established.
■ DRM will likely emerge as a popular way to use the TPM. Media applications such as iTunes can use the TPM’s sealing functions to lock down access to media if tampering takes place.
www.syngress.com