News

Comply to Connect, Cloud Security, Security Automation and Data Protection Highlighted at RSA Conference 2012

Written by Doug | Feb 22, 2012 5:00:00 AM

Comply to Connect, Cloud Security, Security Automation and Data Protection Highlighted in Trusted Computing Group Demonstrations at RSA Conference 2012

The Trusted Computing Group (TCG), a worldwide open industry standards organization, will showcase a number of new demonstrations at its half-day seminar, “The Paradox of Security: Is the Status Quo Acceptable?”, at the RSA Conference 2012 on Monday, Feb. 27, 10 a.m. – 2 p.m. in Esplanade Room 301-303, San Francisco.
“The Paradox of Security: Is the Status Quo Acceptable?”
Demonstrations, many being shown for the first time, include:
  • Comply to connect: Boeing, HSR, Juniper Networks and Microsoft have collaborated to demonstrate the TCG’s new comply to connect solution, which uses TCG standards to easily integrate products from different vendors and ensure continuous monitoring of device security.
  • Physical presence and network access: Through TCG IF-MAP messaging, Hirsch Identive and Enterasys Networks will demonstrate a standards-based solution that provides convergence between physical and logical security disciplines. The demo will show how to deny access to those logging in to the network if they have not badged into the building, deny remote access to those who have badged in, and log persons off local networks when they leave an area or building.
  • Cloud security and trust in security management: Intel Corporation and Trapezoid Digital Security will feature the ability to verify host platform trust as established by Intel Trusted Execution Technology and the required Trusted Platform Module and standard attestation processes. Platform trust status will be reported into virtualization management and security management tools.
  • Automated network protection: Juniper Networks and Lumeta Corp. will demonstrate automated enforcement of a network policy based on TCG’s IF-MAP (Interface-Metadata Access Protocol). Through the discovery of rogue or unauthorized network connections and the dynamic change of access privileges, attendees will see how TNC technologies can help protect the enterprise from these “backdoors”.
  • Data protection with self-encrypting drives (SEDs): Separate demonstrations by Samsung, Seagate, Wave Systems and WinMagic Data Security will demonstrate various aspects of provisioning, managing and decommissioning self-encrypting hard disk and solid state drives in the enterprise.
The program also will include panels and presentations about using self-encrypting drives (SEDs), automating security, and ensuring security for workers’ own devices. Speakers include users from large healthcare organizations, manufacturing companies, nonprofits and federal agencies. The TCG session with demonstrations is free to those registered for RSA. The complete agenda and additional information can be found at http://www.trustedcomputinggroup.org/tcg_virtual_press_room.