PORTLAND, Ore.--(BUSINESS WIRE)--Trusted Computing Group (TCG) experts Bill Sulzen, Cisco Systems, Inc., Michael Eckel, Huawei, and Steve Hanna, Infineon, will provide a tutorial on how to secure network equipment against sophisticated threats in a webcast on Wednesday, May 16, 1:00 p.m. Eastern Daylight Time/10:00 a.m. Pacific Daylight Time..
Much effort has been put into securing data at rest and in transit. But routers, switches and firewalls remain vulnerable to attacks that can compromise these devices, resulting in access to networked data, unsafe network operations and firmware implants that can disable networks.
The webcast will outline key network equipment vulnerabilities and address specific steps to embed network equipment with foundational security, based on a root of trust. Speakers will advise attendees on key requirements and considerations for designing more secure routers, switches and firewalls, and how to harden them against attacks, including malware.
TCG recently released guidance for securing network equipment. Recommendations include:
- Devices should use a TPM as a hardware-based root of trust for secure storage of boot state and hashes and cryptographic secrets
- Devices should provide a cryptographic device identity based on IEEE 802.1AR and use the TPM to protect keys. Cryptographic identity can provide a reliable way to identify remote devices for applications involving device management, configuration and authentication
- The TPM can be used to protect confidential data, such as VPN keys in network equipment
- TPM-based attestation can offer assurance to the integrity of software running on network equipment
- Use of the TPM’s random number generator can enhance the strength of cryptographic protocols by providing additional entropy
TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information is available at www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.
Brands and trademarks are the property of their respective owners.
Tweet this: Join @Cisco @Huawei @Infineon for a webcast @TrustedComputin May 16 on how to design secure network equipment #TPM hardware root of trust to protect against cyber & physical attacks. http://ow.ly/6asT30japVt