Trusted Computing Group Demonstrations at NSA Trusted Computing Conference and Exposition to Focus on Real-World Data Protection, Network Security and Authentication Solutions

Absolute Software, Byres Security, Fritz Technologies, Infoblox, Juniper Networks, Lumeta, Microsoft, NCP, Samsung, Sypris Electronics, Wave Systems and WinMagic to Show Interoperable Solutions

NSA Trusted Computing Conference and Exposition

PORTLAND, Ore.--()--Attendees at the NSA (National Security Agency) Trusted Computing Conference and Expo, September 20-22, Orlando, Fla., will interact with a variety of examples of Trusted Computing products and applications. Trusted Computing is based on the concepts of a hardware root of trust for not only systems such as PCs and servers but for network security, data protection, mobile devices and non-PC computing systems.

The demonstrations from Trusted Computing Group (TCG) members in Booth #401 will show how the Trusted Platform Module can be used for secure authentication and attestation to ensure devices and data are secure; the role of Trusted Network Connect in network security; and self-encrypting drives (SEDs) based on TCG specifications. Individual demos include:

  • Absolute Software will demonstrate the use of Absolute Secure Drive. Absolute Secure Drive manages self-encrypted drives (SEDs) that meet OPAL specifications, an industry standard released in early 2009 by the Trusted Computing Group (TCG).
  • Byres Security and Juniper Networks will show how TCG's IF-MAP technology is used by the Tofino Industrial Security Solution to provide security for millions of legacy PLCs and HMIs used in critical SCADA and process control systems. IF-MAP's publish/subscribe capabilities allow the Tofino Security Appliance to easily coordinate with Juniper network appliances and other vendors' sensors to determine the location and situation of a given SCADA device and tailor security policy in real time.
  • Fritz’s SepKer solution was developed to address the DoD and Intelligence Community need to consolidate data centers and move to the “cloud,” while maintaining secure separation between top secret, secret and unclassified domains. Fritz will be demonstrating the structural solution and administrative features of this highly secure platform (based on the LynuxWorks LynxSecure virtualization technology) including operation of VMs on several security domains at once, isolation of these secure domains, shifting of computing resources between the domains, and the trusted boot of the underlying server hardware based on TPM technology.
  • Infoblox will show its new IBOS™ IF-MAP server for security coordination. By providing a standards-based means for exchanging data in real time between systems from different vendors, the IF-MAP protocol supports a new era of orchestrated applications with dramatically reduced integration costs.
  • Juniper Networks will show its network security products, which implement many TNC standards.
  • Lumeta will demonstrate IPsonar’s IF-MAP Client, which detects network leaks and publishes that information to the TNC Metadata Access Point; other network devices can use the information Lumeta IPsonar discovers to prevent unauthorized "backdoor" Internet connections that bypass network access controls.
  • Microsoft and Juniper Networks will demonstrate a TNC standards-based “comply to connect” solution.
  • NCP, as a member of the ESUKOM project team, will demonstrate how to provide automated security for mobile devices and central IT networks using TCG’s IF-MAP protocol.
  • Samsung will demonstrate Solid-State Drives (SSD) supporting TCG's self-encrypting drive (SED) technology, providing robust protection of stored data using hardware-based encryption built directly into the drive hardware and electronics; protecting sensitive data from loss or theft or during re-purposing, warranty work, or end-of-life.
  • Sypris Electronics will show an integrated security solution, including the TPM, self-encrypting drives and Trusted Network Connect, for remote offices.
  • Wave Systems will demonstrate the management of SEDs, along with log-on in pre-boot using Common Access Cards. In a second demonstration, Wave will show how the TPM offers protection against malware that exports and clones the private keys associated with a software certificate, enabling a hacker to impersonate the user.
  • WinMagic will demonstrate SecureDoc with PBConnex, the first full-disk encryption solution with pre-boot networking. Fully compatible with TCG Opal-compliant drives, PBConnex makes it significantly simpler to authenticate users, enforce access controls and manage end-point devices prior to the OS loading – eliminating the user, deployment and system management headaches previously associated with endpoint encryption.

TCG members Absolute Software, Bit9, Dell, DMI, General Dynamics, Great Bay Software, Infineon, Infoblox, NetApp, Oracle and Wave Systems also will host demonstrations of Trusted Computing in their company booths.

In addition to the demonstrations, TCG member experts are scheduled for a variety of presentations, panels, Birds of a Feather sessions and a Trusted Computing Basics series. More details are available at http://www.trustedcomputinggroup.org/media_room/news/216.

To get more information on the NSA Trusted Computing Conference and Exposition or to register, go to http://www.ncsi.com/nsatc11/index.html. TCG also has information and more details at http://www.trustedcomputinggroup.org/media_room/events/102.

TCG Members Comment

Absolute Software, a market leader in providing critical endpoint security solutions to solve our customer’s needs for data protection and asset management, is pleased to partner with NSA to demonstrate our flagship SED management product, Absolute Secure Drive,” Abigail Maines, vice president, channel strategy. “As an active member of TCG, we are aligned with other industry leaders to drive the rapid deployment of self-encrypted drives which will result in faster, more efficient and secure hard-drive solutions for our customers.”

“There is an unfortunate alphabet soup of protocols for exchanging network information, security policy and security events. Supporting all of them drastically increases both the complexity and exposed attack surface of any SCADA system. IF-MAP gives our security solution a single, highly reliable information exchange with other vendors’ products, allowing us to provide better coordination and better security for critical SCADA systems,” Eric Byres, P.Eng, chief technology officer, Byres Security Inc.

Fritz Technologies’ CEO Bobbi-Michelle Wehrfritz said, “We are excited to be able to demonstrate our security solution for cloud computing to the experts at the TCG conference, and we look forward to developing new relationships with like-minded security specialists.”

“Dealing with today’s complex and fast-changing threats requires seamless, real-time coordination of many different sensing, decision and enforcement systems – which makes secure sharing of data a critical success factor for increasing situational awareness and threat response,” said Richard Kagan, executive vice president and general manager of the Orchestration Systems Business Unit at Infoblox, Inc. Kagan continued, “Infoblox IBOS™ IF-MAP server appliances deliver a critical component of any trusted computing solution by integrating and orchestrating information from any device or system that supports the TCG’s IF-MAP protocol.”

Juniper Networks has been a long-standing supporter of the Trusted Computing Group,” said Steve Hanna, distinguished engineer at Juniper Networks and co-chair of the Trusted Network Connect Work Group in Trusted Computing Group. “We helped create the Trusted Network Connect (TNC) architecture and standards, which provide the foundation for today's open and secure networking environment. We have implemented those standards broadly across our product line and brought them to the IETF for approval as Internet standards. We're pleased to see the growth and success of the TCG and its TNC standards, as evidenced by the enthusiasm and broad participation at this year's Trusted Computing Conference.”

Lumeta has participated in shaping the IF-MAP standard and has been shipping IPsonar with an IF-MAP client for several years,” said Michael Markulec, president and CEO of Lumeta Corporation. “Lumeta IPsonar uses IF-MAP to enrich security management information with our patented network leak discovery.”

“The NSA TCCE offers a great chance for us to show the latest TCG additions to our VPN solution and the achievements of the ESUKOM project by demonstrating how to provide automated security for mobile devices and central IT networks using TCG IF-MAP technology,” Jens Lucius, security engineer, NCP engineering.

Samsung is proud to be the first SSD vendor to support TCG's self-encrypting drive technology, which satisfies the encryption 'safe harbor' requirements of state, federal, and international legislation. Self-encryption has proven to be superior to software-based encryption of stored data,” stated Dr. Michael Willett, storage security strategist for Samsung.

Trusted Computing Group

The Trusted Computing Group (TCG) provides open standards that enable a safer computing environment across platforms and geographies. Benefits of Trusted Computing include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Organizations using built-in, widely available trusted hardware and applications reduce their total cost of ownership. TCG technologies also provide regulatory compliance that is based upon trustworthy hardware. More information and the organization’s specifications and work groups are available at the Trusted Computing Group’s website, www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

Brands and trademarks are the property of their respective owners.

Contacts

PR Works, Inc.
Anne Price, 602-840-6495
anne@prworksonline.com

Contacts

PR Works, Inc.
Anne Price, 602-840-6495
anne@prworksonline.com