Trusted Computing Adds to TNC
Trusted Computing Group adds support for java and VOIP endpoints to TNC
SAN FRANCISCO -- The Trusted Computing Group (TCG), whose open specifications for computing security are implemented on virtually every new enterprise PC, in many vendors’ networking equipment and in servers, today announced enhancements to its Trusted Network Connect (TNC) non-proprietary specifications for network access control.
A number of companies will show trusted computing in action at RSA 2007 Booth #2643.
TNC Updates for Network Access Control
TCG’s TNC architecture provides a common framework for the collection and exchange of endpoint integrity data in heterogeneous networking environments. It is based on the concepts of integrity, or the state of the client’s “health”, and identity, in which systems are authenticated for authorized users only. For example, clients trying to connect to a network are measured and evaluated against a set of policies and pre-determined platform configurations established by their organization’s IT department. Clients not meeting pre-determined policies, such as those for patch levels, anti-virus software or operating system configuration, can be quarantined for remediation.
About the Author
You May Also Like
Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024