informa
/
Risk
News

Trusted Computing Adds to TNC

Trusted Computing Group adds support for java and VOIP endpoints to TNC

SAN FRANCISCO -- The Trusted Computing Group (TCG), whose open specifications for computing security are implemented on virtually every new enterprise PC, in many vendors’ networking equipment and in servers, today announced enhancements to its Trusted Network Connect (TNC) non-proprietary specifications for network access control.

A number of companies will show trusted computing in action at RSA 2007 Booth #2643.

TNC Updates for Network Access Control

TCG’s TNC architecture provides a common framework for the collection and exchange of endpoint integrity data in heterogeneous networking environments. It is based on the concepts of integrity, or the state of the client’s “health”, and identity, in which systems are authenticated for authorized users only. For example, clients trying to connect to a network are measured and evaluated against a set of policies and pre-determined platform configurations established by their organization’s IT department. Clients not meeting pre-determined policies, such as those for patch levels, anti-virus software or operating system configuration, can be quarantined for remediation.

Trusted Computing Group

Recommended Reading:
Editors' Choice
Kirsten Powell, Senior Manager for Security & Risk Management at Adobe
Joshua Goldfarb, Director of Product Management at F5