Welcome!

Eclipse Authors: Pat Romanski, Elizabeth White, Liz McMillan, David H Deans, JP Morgenthal

News Feed Item

Trusted Computing Group Offers Security Assurances for Systems and Networks with Certified Products

Trusted Computing Group today announced that it has certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation protocol, IF-MAP. TCG’s certification program ensures that implementations of its specifications are complete and consistent.

STMicroelectronics has been certified for its ST33TPM12LPC TPM. Powered by the highly secure 32-bit ARM SC300 SecurCore CPU, ST’s Trusted Platform Module guards sensitive data such as keys, passwords and digital certificates, and provides trustworthy reports of system integrity while protecting against threats such as software attacks or theft and tampering. The ST33TPM12LPC (LPC version) has completed a Common Criteria (CC) security evaluation and has received EAL4+ certification by the French certification body in July 2012. That security certification as well as the functional compliancy allows the product to be certified by the TCG as a TPM certified product.

The U.S. National Institute for Standards and Technology (NIST) recently issued a recommendation to deploy TPMs as protection against a variety of security threats. More than 500 million systems and devices are protected by the TPM.

Three organizations also have certified their implementations of the TCG IF-MAP (Interface for Metadata Access Point) that coordinates and automates security across a wide variety of devices and applications via a standards-based publish/subscribe model.

The [email protected] research group (FH-Hannover) has certified its irond open source IF-MAP server. The server was developed as part of the group’s overall efforts towards leveraging the capabilities of IF-MAP in various research projects, such as ESUKOM. irond is written in Java and can thus be easily deployed on a wide range of platforms. [email protected] is a liaison member of the Trusted Computing Group and has contributed to several specifications.

Infoblox received certification for its Orchestration Server (IBOS). Infoblox, a member of the Trusted Computing Group, has contributed to the IF-MAP standard and was the first company to offer an enterprise-ready, high performance platform for IF-MAP deployments. Infoblox Orchestration Server delivers the IF-MAP standard approach for automating systems, processes and applications. It can be used to aggregate and distribute metadata to and from a very wide range of systems, including:

  • Network infrastructure systems, including routers, switches, load balancer, and DNS/DHCP servers
  • Network security systems such as firewalls, intrusion detection/prevention systems (IDS/IPSs), endpoint scanning/compliance systems, policy servers and security information and event management (SIEM) systems
  • Authentication systems, such as RADIUS and Microsoft Active Directory systems
  • Building control, factory automation, smart grid and other physical control systems
  • Asset management, ERP, CRM, HR and other business applications

omapd certified an open source IF-MAP Server, which implements the IF-MAP 1.1 and 2.0 specifications. omapd is written in C++ using the Qt Framework from Nokia. Qt was chosen for its excellent network, XML, and container classes; multi-platform support; and LGPL licensing.

Products certified by TCG website are listed at http://www.trustedcomputinggroup.org/certification.

About Trusted Computing Group

TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization’s specifications are available at www.trustedcomputinggroup.org.

Brands and names are the property of their respective owners.

Tweet this: STMicro #ST_World, #TPM, 3 IF-MAP servers for security automation certified by @Trustedcomputin http://bit.ly/R76ohR

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...