Welcome!

News Feed Item

Trusted Computing Group Offers Security Assurances for Systems and Networks with Certified Products

Trusted Computing Group today announced that it has certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation protocol, IF-MAP. TCG’s certification program ensures that implementations of its specifications are complete and consistent.

STMicroelectronics has been certified for its ST33TPM12LPC TPM. Powered by the highly secure 32-bit ARM SC300 SecurCore CPU, ST’s Trusted Platform Module guards sensitive data such as keys, passwords and digital certificates, and provides trustworthy reports of system integrity while protecting against threats such as software attacks or theft and tampering. The ST33TPM12LPC (LPC version) has completed a Common Criteria (CC) security evaluation and has received EAL4+ certification by the French certification body in July 2012. That security certification as well as the functional compliancy allows the product to be certified by the TCG as a TPM certified product.

The U.S. National Institute for Standards and Technology (NIST) recently issued a recommendation to deploy TPMs as protection against a variety of security threats. More than 500 million systems and devices are protected by the TPM.

Three organizations also have certified their implementations of the TCG IF-MAP (Interface for Metadata Access Point) that coordinates and automates security across a wide variety of devices and applications via a standards-based publish/subscribe model.

The [email protected] research group (FH-Hannover) has certified its irond open source IF-MAP server. The server was developed as part of the group’s overall efforts towards leveraging the capabilities of IF-MAP in various research projects, such as ESUKOM. irond is written in Java and can thus be easily deployed on a wide range of platforms. [email protected] is a liaison member of the Trusted Computing Group and has contributed to several specifications.

Infoblox received certification for its Orchestration Server (IBOS). Infoblox, a member of the Trusted Computing Group, has contributed to the IF-MAP standard and was the first company to offer an enterprise-ready, high performance platform for IF-MAP deployments. Infoblox Orchestration Server delivers the IF-MAP standard approach for automating systems, processes and applications. It can be used to aggregate and distribute metadata to and from a very wide range of systems, including:

  • Network infrastructure systems, including routers, switches, load balancer, and DNS/DHCP servers
  • Network security systems such as firewalls, intrusion detection/prevention systems (IDS/IPSs), endpoint scanning/compliance systems, policy servers and security information and event management (SIEM) systems
  • Authentication systems, such as RADIUS and Microsoft Active Directory systems
  • Building control, factory automation, smart grid and other physical control systems
  • Asset management, ERP, CRM, HR and other business applications

omapd certified an open source IF-MAP Server, which implements the IF-MAP 1.1 and 2.0 specifications. omapd is written in C++ using the Qt Framework from Nokia. Qt was chosen for its excellent network, XML, and container classes; multi-platform support; and LGPL licensing.

Products certified by TCG website are listed at http://www.trustedcomputinggroup.org/certification.

About Trusted Computing Group

TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization’s specifications are available at www.trustedcomputinggroup.org.

Brands and names are the property of their respective owners.

Tweet this: STMicro #ST_World, #TPM, 3 IF-MAP servers for security automation certified by @Trustedcomputin http://bit.ly/R76ohR

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera M...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...