Welcome!

Industrial IoT Authors: Yeshim Deniz, Elizabeth White, Stackify Blog, SmartBear Blog, Liz McMillan

News Feed Item

Trusted Computing Group Offers Security Assurances for Systems and Networks with Certified Products

Trusted Computing Group today announced that it has certified four products, including a Trusted Platform Module (TPM) and three products supporting the group’s security automation protocol, IF-MAP. TCG’s certification program ensures that implementations of its specifications are complete and consistent.

STMicroelectronics has been certified for its ST33TPM12LPC TPM. Powered by the highly secure 32-bit ARM SC300 SecurCore CPU, ST’s Trusted Platform Module guards sensitive data such as keys, passwords and digital certificates, and provides trustworthy reports of system integrity while protecting against threats such as software attacks or theft and tampering. The ST33TPM12LPC (LPC version) has completed a Common Criteria (CC) security evaluation and has received EAL4+ certification by the French certification body in July 2012. That security certification as well as the functional compliancy allows the product to be certified by the TCG as a TPM certified product.

The U.S. National Institute for Standards and Technology (NIST) recently issued a recommendation to deploy TPMs as protection against a variety of security threats. More than 500 million systems and devices are protected by the TPM.

Three organizations also have certified their implementations of the TCG IF-MAP (Interface for Metadata Access Point) that coordinates and automates security across a wide variety of devices and applications via a standards-based publish/subscribe model.

The [email protected] research group (FH-Hannover) has certified its irond open source IF-MAP server. The server was developed as part of the group’s overall efforts towards leveraging the capabilities of IF-MAP in various research projects, such as ESUKOM. irond is written in Java and can thus be easily deployed on a wide range of platforms. [email protected] is a liaison member of the Trusted Computing Group and has contributed to several specifications.

Infoblox received certification for its Orchestration Server (IBOS). Infoblox, a member of the Trusted Computing Group, has contributed to the IF-MAP standard and was the first company to offer an enterprise-ready, high performance platform for IF-MAP deployments. Infoblox Orchestration Server delivers the IF-MAP standard approach for automating systems, processes and applications. It can be used to aggregate and distribute metadata to and from a very wide range of systems, including:

  • Network infrastructure systems, including routers, switches, load balancer, and DNS/DHCP servers
  • Network security systems such as firewalls, intrusion detection/prevention systems (IDS/IPSs), endpoint scanning/compliance systems, policy servers and security information and event management (SIEM) systems
  • Authentication systems, such as RADIUS and Microsoft Active Directory systems
  • Building control, factory automation, smart grid and other physical control systems
  • Asset management, ERP, CRM, HR and other business applications

omapd certified an open source IF-MAP Server, which implements the IF-MAP 1.1 and 2.0 specifications. omapd is written in C++ using the Qt Framework from Nokia. Qt was chosen for its excellent network, XML, and container classes; multi-platform support; and LGPL licensing.

Products certified by TCG website are listed at http://www.trustedcomputinggroup.org/certification.

About Trusted Computing Group

TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization’s specifications are available at www.trustedcomputinggroup.org.

Brands and names are the property of their respective owners.

Tweet this: STMicro #ST_World, #TPM, 3 IF-MAP servers for security automation certified by @Trustedcomputin http://bit.ly/R76ohR

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...