Agenda. Cooperation for a promising future. February The Utimaco customer base TCG - the organization TCG technology
|
|
- Ashley Bryant
- 6 years ago
- Views:
Transcription
1 1 Cooperation for a promising future February 2004 Agenda he Utimaco customer base CG - the organization CG technology PM 1.2 CG PC implementation CG products made by Utimaco he make of CG technology and perception he mobile world of tomorrow (or is it already today...) 2
2 2 Blue Chip - Customer Base Banks & Insurances Government rade, ransport & Industry Business Services DBV Versicherung Allianz Gruppe Dresdner Bank Deutsche Bank Foerenings Sparbanken Banque de France National Bank of Sweden SEB Lloyds SB Robert Fleming Société Générale Crédit Suisse UBS Raiffeisen Banken Fed. Res. Bank of Boston Den norske Bank ABN AMRO Bank Fortis Bank United Asia Finance Isaserver Swift Bourse de Luxembourg Banque Central de Luxembourg etc. European Commission NAO FBI Min. of Finance (BUL,D,NL) Min. of Interior (SLO,F) Min. of Justice (B,D,NL) Rijkspolitie (NL) Canadian C & R Agency Justizdirektion Zürich Bundeswehr Skattedirektoratet Kadaster (NL) Sev. national Police forces National reasury Office (S) HKSAR/Government (HK) Bundesamt f. Finanzen Land of Berlin Land of Baden-Württemberg Police of Hamburg Police of Schleswig-Holstein Ministerie van Landsverdediging (B) etc. Nokia Daimler-Chrysler Volkswagen Mitsubishi Norsk Hydro Novartis Astra Zeneca Sanofi Aventis Pfizer Abbott McDonald s Nestlé Cartier British American obacco Alfa Laval Statoil ABB AGA GAS SKF DSM etc. Ernst & Young Price Waterhouse Coopers Danzas Adecco IBM Fujitsu Siemens Swiss Post La Poste (France) -Systems / Debis KPN elecom British elecom HongKong elecom elenor Vodafone China Light & Power UK Lottery Global One Cert Europe PG Group etc. 3 echnology Cooperation In the center of future computing is trusted computing and How ist works > 4
3 3 he Evolution of the Standard Member Status January 04 Promoters: AMD*, Hewlett Packard*, IBM*, Intel*, Microsoft*, Seagate* +, Sony*, Sun Microsystems*, and Verisign* + Contributors: Agere Systems*, ARM*, Ai echnologies*, Atmel*, Broadcom Corporation*, Comodo*, Fujitsu Limited*, Fujitsu-Siemens Computers*, Gemplus*, Infineon*, Legend Limited Group*, National Semiconductor*, Nokia*, NRU Crytosystems, Inc.*, NVIDIA*, Phoenix*, Philips*, Rainbow echnologies*, RSA Security*, Seagate*, Shang Hai Wellhope Information*, Silicon Storage echnology*, Standard Microsystems*, SMicroelectronics*, exas Instruments*, Utimaco Software AG*, VeriSign Inc.*, Wave Systems* Adopters: Ali Corporation*, Gateway*, M-Systems*, Silicon Integrated Systems*, Softex*, oshiba*, Winbond Electronics* A number of additional companies have expressed interest and intent to join * Names and brands are properties of their respective owners 5 CG Components PM (rusted Platform Module) I/O Non-Volatile Storage Random Number Generator SHA-1 Engine Platform Configuration Register (PCR) Key Generation Attestation Identity Key (AIK) RSA Engine rusted Platform Module (PM) Packaging Opt-In Program Code Exec Engine 6
4 4 What (only) a PM can perform Platform integrity 7 What (only) a PM can perform Platform integrity at work: parachute plain text data into a foe or friend environment... and there is a lot more... 8
5 5 What (only) a PM can perform 9 From PM to SS (CG Software Stack) PM is a subsystem with protected storage and protected capabilities he PM is intended to provide trust and intended to be an inexpensive component Narrow resources Cumbersome interfaces Separation Protected storage and protected capabilities Others (CPU, main storage) I/F: SS SS: Single entry point for applications to the PM functionality Synchronization Manage PM resources and their release 10
6 6 CG Policy Position Platform Owner and User Control CG is committed to ensuring owners and users of computing platforms remain in full control of their computing platform, and to require platform owners to opt-in to enable CG features Backwards Compatibility CG commits to make reasonable efforts to ensure backward compatibility in future specifications for currently approved specifications 11 he Evolution of the Standard PM 1.2 Specification announced Nov. 5, 2003 Direct anonymous attestation reliably communicates information about the static or dynamic capabilities of a computer with a rusted Platform Module Locality allows owners of the rusted Platform Module to assign permissions to external software processes Delegation allows platform owners to delegate software, an object or other entity to use specific, owner-authorized commands, without allowing access of other commands in the rusted Platform Module 12
7 7 he Evolution of the Standard PM 1.2 Specification announced Nov. 5, 2003 Non-volatile storage can be used by system software or firmware to store information on the rusted Platform Module ransport protection for commands sent to the rusted Platform Module Monotonic counters ick counter rusted Platform Modules for computing devices to include additional privacy protections, more user control, better defense against attacks 13 he Evolution of the Standard PC Specific Implementation Specification v.1., August 2003 Implementation reference for the 32-bit PC architecture Usage of PCR registers in the Pre-Boot state through the transition to Post-Boot state How the BIOS, or a component thereof, functions as the Core Root of rust for Measurement (CRM) Programmatic Interfaces to the BIOS as it performs the functions of the CG Subsystem (SS and access to the PM) Behavior entering, during, and exiting power and initialization states Guidelines for Option ROMS Status: Work-in-progress! Subject to changes! 14
8 8 he Evolution of the Standard - Implementation rusted Platform Modules (PM) based on 1.1b specification available from PM vendors Atmel*..Atmel PM 1.2 Infineon* RM now! National Semiconductor* Compliant PC platforms shipping now IBM* hinkpad notebooks and NetVista desktops HP* D530 desktops More expected soon Application support by multiple ISV s CG Software Stack (SS) announced Sept. 16, 2003 PM 1.2 Specification announced Nov. 5, 2003 * Names and brands are properties of their respective owners 15 he Evolution of the Standard Work groups operational, Jan 04 Marketing Work Group rusted Platform Module (PM) PM Software Stack (SS) PC Specific Implementation Server Specific Implementation PDA Specific Implementation Mobile Phone Specific Implementation Conformance (Common Criteria) InfraStructure Peripherals Additional work groups anticipated 16
9 9 Utimaco Safeware: CG Related Products 17 Utimaco Safeware: CG Related Products he entire Utimaco portfolio takes advantage of CG SafeGuard Easy (Hard Disk Bulk Encryption) SafeGuard PrivateDisk (confidentiality container) SafeGuard LogonGuard (SingleSignOn) SafeGuard LANCrypt (transparent file encryption, secure collaboration work) SafeGuard Advanced Security (Authentication, Biometrics,Removable Media Management, policy enforcement, integrity,...) HSM (High Security Module), high-level tamper proof and sealed PCI board for servers. It carries a cryptocoprocessor as well as secure key storage facilities. he HSM is used to serve PKI and CG infrastructures 18
10 10 Utimaco CG Products Benefits PM is used as Root of rust Secure storage of credentials without external readers Machine binding only authorized users can access client or hard drive steeling parts is useless SSO to the OS and applications Security joins convenience Challenge/Response via voice recognition: can be used for 24x7h support, even if malicious client logins are a major risk Utimaco High Security Module (HSM) based help desk system can handle malicious help desk users for remote support (credentials are unknown to administrators, smartcards and certificates can be revoked easily) 19 CG, Utimaco and History CG Contributor Membership Member of Infineon Silicon rust World premiere: During the 4 th Security Solutions Forum, London, November 2002, Utimaco presented a prototype of CG technology, comprising harddisk encryption, SSO and automatic virtual drive mounting - based on Infineon PM First sales successes at Fortune 500 customers already achieved IP on application software as well as low-level programming Celebration 5th of Febuary, 2004: 20 years I-security made in Germany by Utimaco Safeware AG Profitable and public company Worldwide sales, support and partners * Names and brands are properties of their respective owners 20
11 11 ech Facts and Public Opinion Anyone who considers arithmetic methods of producing random digits is, of course, in a state of sin. (John von Neumann) Random Number Generator Rob Enderle, he Enderle Group: rusted Computing: "Maligned by Misrepresentations and Creative Fabrications" he rusted Computing Group can help fix a lot of what's wrong with PC security he group is laboring under the burden of a couple of misconceptions by the public: Despite misconceptions to the contrary, this group is not directed by either Microsoft or the U.S. government. hey are not primarily focused on Digital Rights Management; any secure repository would be attractive to a DRM solution, but DRM is not the goal of this group. 21 Mobile Security is Design Inherent Gartner comments, he architecture assumes that the connection is equivalent to the office LAN unfortunately, just a little slower. In practice, response times may make client/server applications unusable Utimaco products are designed to cope with the challenges of the mobile world: Notebook access recovery even when internet access is not possible (sales force) by using an infrastructure with a higher level of ubiquity Decrease of CO via headless helpdesk based on voice recognition systems Error free enforcement of corporate security policy 22
12 12 Your trusted partner for I security since 20 years! Alexander W. Koehler alexander.koehler@utimaco.de 23
An Introduction to Trusted Platform Technology
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK Siani_Pearson@hp.com Content What is Trusted Platform technology and TCPA? Why is Trusted Platform technology
More informationTrusted Computing & Trusted Computing Group. January Claire Vishik, Intel
Trusted Computing & Trusted Computing Group January 15 2008 Claire Vishik, Intel 1 Agenda Technology Introduction Premises for Trusted Computing TCG and Trusted Computing Technology Trusted Computing Group
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationTrusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1
Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept 2005 TCG Track: SEC 502 1 The Need for Trusted Computing 2 The Real World Innovation is needed: Client software
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Roadmap: TPM
More informationLecture Secure, Trusted and Trustworthy Computing Trusted Platform Module
1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2017/18 Roadmap: TPM
More informationDistributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing
Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 30/05/11 Goals Understand principles of: Authenticated booting The difference to (closed) secure
More informationTerra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006)
Terra: A Virtual Machine-Based Platform for Trusted Computing by Garfinkel et al. (Some slides taken from Jason Franklin s 712 lecture, Fall 2006) Trusted Computing Hardware What can you do if you have
More informationOVAL + The Trusted Platform Module
OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 Overview OVAL Can assess a vast diversity of system state Usually software based software attacks can compromise Trusted Platform Module
More informationAuthenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2009
Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2009 Goals Understand principles of: authenticated booting the
More informationELCT 912: Advanced Embedded Systems
ELCT 912: Advanced Embedded Systems Lecture 2-3: Embedded System Hardware Dr. Mohamed Abd El Ghany, Department of Electronics and Electrical Engineering Embedded System Hardware Used for processing of
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationLecture Embedded System Security Trusted Platform Module
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture
More informationAuthenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing. Hermann Härtig Technische Universität Dresden Summer Semester 2007
Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing Hermann Härtig Technische Universität Dresden Summer Semester 2007 Goals Understand: authenticated booting the difference
More informationOffline dictionary attack on TCG TPM authorisation data
Offline dictionary attack on TCG TPM authorisation data Liqun Chen HP Labs, Bristol Mark D. Ryan HP Labs, Bristol University of Birmingham ASA workshop @CSF'08 June 2008 The Trusted Platform Module A hardware
More informationLenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009
Hardware Announcement ZG09-0077, dated January 27, 2009 Utimaco SafeGuard Enterprise suite of offerings for ThinkVantage Technologies offers hard drive encryption and additional modules for complete PC
More informationDistributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing
Distributed OS Hermann Härtig Authenticated Booting, Remote Attestation, Sealed Memory aka Trusted Computing 02/06/14 Goals Understand principles of: Authenticated booting, diference to (closed) secure
More informationFC-NVMe. NVMe over Fabrics. Fibre Channel the most trusted fabric can transport NVMe natively. White Paper
FC-NVMe NVMe over Fabrics Fibre Channel the most trusted fabric can transport NVMe natively BACKGROUND AND SUMMARY Ever since IBM shipped the world s first hard disk drive (HDD), the RAMAC 305 in 1956,
More informationSystems View -- Current. Trustworthy Computing. TC Advantages. Systems View -- Target. Bootstrapping a typical PC. Boot Guarantees
Trustworthy Computing s View -- Current Trent Jaeger February 18, 2004 Process 1 Web server Process 2 Mail server Process 3 Java VM Operating Hardware (CPU, MMU, I/O devices) s View -- Target TC Advantages
More informationTPM v.s. Embedded Board. James Y
TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationTRUSTED COMPUTING TRUSTED COMPUTING. Overview. Why trusted computing?
Overview TRUSTED COMPUTING Why trusted computing? Intuitive model of trusted computing Hardware versus software Root-of-trust concept Secure boot Trusted Platforms using hardware features Description of
More informationHow to create a trust anchor with coreboot.
How to create a trust anchor with coreboot. Trusted Computing vs Authenticated Code Modules Philipp Deppenwiese About myself Member of a hackerspace in germany. 10 years of experience in it-security. Did
More informationTRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE
SESSION ID: TECH-F03 TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE Tom Dodson Supply Chain Security Architect Intel Corporation/Business Client Products Monty Wiseman Security
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationTPM Training. Dan Morav Security Architect and Application Manager Member of Technical Staff
TPM Training Technion Feb 2007 Dan Morav (dmorav@winbond.com) Security Architect and Application Manager Member of Technical Staff About Winbond Israel -Advanced PC Center Design Center established by
More informationEfficient, broad-based solution for a Swiss digital ID
Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous
More informationThe OMG GRC GRID. High Level Overview. Object Management Group GRC Program
The OMG GRC GRID High Level Overview Object Management Group GRC Program http://www.omg.org/ Introduction The Object Management Group was founded in 1989. Today, with over 470 member organizations, OMG
More informationEasy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications
Infineon Network Use Case Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications Providing Infineon customers with an easy path to integrating TPM support into their products and systems
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust
More informationHp Enterprise Secure Key Manager User Guide
Hp Enterprise Secure Key Manager User Guide HP StoreEver MSL Tape Libraries Encryption Key Server Configuration Guide follow theinstructions in the HP Enterprise Secure Key Manager User Guide. LDAP and
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationDesign and Implementation of a RFC3161-Enhanced Time-Stamping Service
Design and Implementation of a RFC3161-Enhanced Time-Stamping Service Chung-Huang Yang, 1 Chih-Ching Yeh, 2 and Fang-Dar Chu 3 1 Institute of Information and Computer Education, National Kaohsiung Normal
More informationThe Honest Advantage
The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationThe Future of Security is in Open Silicon Linux Security Summit 2018
The Future of Security is in Open Silicon Linux Security Summit 2018 Joel Wittenauer - Embedded Software Architect Rambus Cryptography Research August 28, 2018 Agenda About Rambus Cryptography Research
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationTrusted Mobile Platform Technology for Secure Terminals
Trusted Mobile Platform Technology for Secure Terminals Yu Inamura, Takehiro Nakayama and Atsushi Takeshita Trusted Mobile Platform is a key technology for increasing the trust of mobile terminals such
More informationSecure Application Trend in Smartphones. STMicroelectronics November 2017
Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research
More informationUtimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1
Utimaco IS GmBH Teo Poh Soon Director CryptoServer Products Aachen, Germany June 2014 Page 1 Utimaco Overview 100 % ownership by Utimaco GmbH Corporate Headquarter in Aachen, Germany Offices in USA, UK,
More informationWorldwide Workstation Shipments Rebound in Third Quarter
Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase
More informationPKI Credentialing Handbook
PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key
More informationServer side management system for multiple IoT terminals in industrial systems
Infineon Network Use Case Server side management system for multiple IoT terminals in industrial systems This system utilizes the technology of the Trusted Computing Group (TCG) as a time-to-market solution
More informationCSE543 - Computer and Network Security Module: Trusted Computing
CSE543 - Computer and Network Security Module: Trusted Computing Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 What is Trust? 2 What is Trust? dictionary.com Firm reliance
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationA Pragmatic Path to Compliance. Jaffa Law
A Pragmatic Path to Compliance Jaffa Law jaffalaw@hk1.ibm.com Introduction & Agenda What are the typical regulatory & corporate governance requirements? What do they imply in terms of adjusting the organization's
More informationVERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT
VERSION 1.3 MAY 1, 2018 SNOWFLY PRIVACY POLICY SNOWFLY PERFORMANCE INC. P.O. BOX 95254, SOUTH JORDAN, UT 84095-9998 SNOWFLY PRIVACY POLICY This Privacy Policy describes Snowfly s practices regarding the
More informationThe Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components
YOUR ULTIMATE AUTHENTICATION SOLUTION A l a d d i n. c o m / e T o k e n The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are
More informationDepartment of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD
Department of Computer Science Institute for System Architecture, Operating Systems Group TRUSTED COMPUTING CARSTEN WEINHOLD THIS LECTURE... Today: Technology Lecture discusses basics in context of TPMs
More informationAdding value to your MS customers
Securing Microsoft Adding value to your MS customers Authentication - Identity Protection Hardware Security Modules DataSecure - Encryption and Control Disc Encryption Offering the broadest range of authentication,
More informationGreen IT Strategies and Practices for a Sustainable Europe
CeBIT Green IT 2010 Green IT Strategies and Practices for a Sustainable Europe Dr. Colette Maloney Head of Unit ICT for Sustainable Growth European Commission Information Society and Media Directorate-General
More informationEU Policy Management Authority for Grid Authentication in e-science Charter Version 1.1. EU Grid PMA Charter
EU Grid PMA Charter This charter defines the policies, practices, and bylaws of the European Policy Management Authority for Grid Authentication in e-science. 1 Introduction The European Policy Management
More informationList of companies for which the EU BCR cooperation procedure is closed
List of companies for which the EU BCR cooperation procedure is closed Updated on 24 May 2018 Company name ABN AMRO Bank N.V. ADIENT ADP (Controller and Processor) AGCO (Controller) Airbus (Controller)
More informationChallenges Managing Self-Encrypting NAND Flash Devices
Challenges Managing Self-Encrypting NAND Flash Devices Sandler Rubin Senior Product Manager, Symantec Corp. Santa Clara, CA 1 Agenda 1 Business Case for Encryption 2 What s Wrong with Self-Encrypting Flash?
More informationUEFI What is it? Spring 2017 UEFI Seminar and Plugfest March 27-31, 2017 Presented by Dong Wei (ARM) presented by. Updated
presented by UEFI What is it? Spring 2017 UEFI Seminar and Plugfest March 27-31, 2017 Presented by Dong Wei (ARM) Updated 2011-06- 01 UEFI Plugfest March 2017 www.uefi.org 1 Agenda Introduction Background
More informationGrids and Security. Ian Neilson Grid Deployment Group CERN. TF-CSIRT London 27 Jan
Grids and Security Ian Neilson Grid Deployment Group CERN TF-CSIRT London 27 Jan 2004-1 TOC Background Grids Grid Projects Some Technical Aspects The three or four A s Some Operational Aspects Security
More informationTrusted Computing Today: Benefits and Solutions
Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationTrusted Computing and O/S Security. Aggelos Kiayias Justin Neumann
Trusted Computing and O/S Security Aggelos Kiayias Justin Neumann O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each layer may try to verify the outer layer
More informationEBV Personalization Services for Security Devices
Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated
More informationMobile Data Security Essentials for Your Changing, Growing Workforce
Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity
More informationSony Ericsson starts 2007 with strong first quarter
PRESS RELEASE April 20, 2007 Sony Ericsson starts 2007 with strong first quarter Q1 Highlights: Year-on-year volume & sales growth of 63% and 47% respectively Income before tax rose 139% year-on-year to
More informationSecuring Network Devices with the IEC Standard What You Should Know. Vance Chen Product Manager
with the IEC 62443-4-2 Standard What You Should Know Vance Chen Product Manager Industry Background As the Industrial IoT (IIoT) continues to expand, more and more devices are being connected to networks.
More informationSeagate Supply Chain Standards and Operational Systems
DATA IS POTENTIAL Seagate Supply Chain Standards and Operational Systems Government Solutions Henry Newman May 9 2018 Supply Chain Standards and Results Agenda 1. 2. SUPPLY CHAIN REQUIREMENTS AND STANDARDS
More informationSafeGuard Easy Demo guide. Product version: 6.1
SafeGuard Easy Demo guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What
More informationNew Partners Join Charter of Trust to Protect Critical Infrastructure
Siemens, The AES Corporation, Airbus, Allianz, Atos, Enel, Daimler Press Houston, March 8, 2018 New Partners Join Charter of Trust to Protect Critical Infrastructure The AES Corporation, Atos and Enel
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationFundamentals of HW-based Security
Fundamentals of HW-based Security Udi Maor CryptoCell-7xx Product Manager Systems and SW Group ARM Tech Forum 2016 - Korea Jun. 28, 2016 What is system security design? Every system design will require
More informationIdentity & security CLOUDCARD+ When security meets convenience
Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and
More informationWindows Phone 8.1 Release Date In India For. Lumia 620 >>>CLICK HERE<<<
Windows Phone 8.1 Release Date In India For Lumia 620 Windows 10 Forums Windows Phone 8.1 forums Cortana forums Lumia forums Microsoft Band Forums *Although the Lumia 830 ships with a version of Denim,
More informationTHE CHAIN OF TRUST. Keeping Computing Systems More Secure. Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd.
THE CHAIN OF TRUST Keeping Computing Systems More Secure Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd. Dick_Wilkins@phoenix.com Toby Nixon, Senior Standards Program Manager Windows and Devices
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationBioPassport TM Enterprise Server
BioPassport TM Enterprise Server The BioPassport Enterprise AD Server is the intelligence behind all of IdentAlink s biometric modules. Password management for a network or application can cost hundreds
More informationsecunet Security Networks AG SINA an Overview Sofia,
secunet Security Networks AG SINA an Overview Sofia, 10.6.2014 Agenda 1 Some facts about secunet 2 SINA Portfolio 3 SINA References 4 Voice Solutions secunet Security Networks AG 2010 2 Some facts about
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationHP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.
HP Security Solutions for business PCs Comprehensive protection measures so you can work smarter and with greater confidence. Companies lose millions of dollars every year due to inadequate security. Informally-run
More informationUtimaco HSM Introduction JIPDEC Seminar June 2017
Utimaco HSM Introduction JIPDEC Seminar June 2017 Joerg Horn Director Business Development Utimaco HSM Business Unit Aachen, Germany 2016 hsm.utimaco.com Page 1 Part 1 Introduction Utimaco History HSM
More informationTrusted Computing and O/S Security
Computer Security Spring 2008 Trusted Computing and O/S Security Aggelos Kiayias University of Connecticut O/S Security Fundamental concept for O/S Security: separation. hardware kernel system user Each
More informationKey activities of the Global Gas Flaring Reduction Partnership
Key activities of the Global Gas Flaring Reduction Partnership Methane to Markets Ministerial Meeting, November 15-17, 2004 Dr. Sascha T. Djumena 1 Background of Global Flaring Global venting and flaring
More informationMagento GDPR Frequently Asked Questions
Magento GDPR Frequently Asked Questions Whom does GDPR impact? Does this only impact European Union (EU) based companies? The new regulation provides rules that govern how companies may collect and handle
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationIntel s s Security Vision for Xen
Intel s s Security Vision for Xen Carlos Rozas Intel Corporation Xen Summit April 7-8, 7 2005 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS
More informationConfiguring and Using AMT on TS130. Lenovo ThinkServer
Lenovo ThinkServer August 31, 2011 Contents Overview... 3 Enabling and Configuring AMT on TS130... 3 Provisioning AMT on TS130 Using Manual Configuration Method... 4 AMT Configuration with Web Interface...
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationEnterprise Key Management Infrastructure: Understanding them before auditing them. Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EI-TC Agenda What is an EI? Components of an EI Auditing an EI ISACA members
More informationCeBIT Preview January Make the cloud a safer place
CeBIT Preview 2011 January 2011 Make the cloud a safer place 0 There were times when people thought there was nothing more important than gold Security depends on what you have to protect 1 information
More informationA Perspective on the Role of Open-Source IP In Government Electronic Systems
A Perspective on the Role of Open-Source IP In Government Electronic Systems Linton G. Salmon Program Manager DARPA/MTO RISC-V Workshop November 29, 2017 Distribution Statement A (Approved for Public Release,
More informationMobile Platform Security Architectures A perspective on their evolution
Mobile Platform Security Architectures A perspective on their evolution N. Asokan CARDIS 2012 Graz, Austria November 29, 2012 1 NA, KKo, JEE, Nokia Resarch Center 2011-2012 Introduction Recent interest
More informatione-security Task Group Hong Kong Post e-cert: Enabling Secure Electronic Transactions
E Hong Kong Post e-cert: Enabling Secure Electronic Transactions Doc no: telwg29/ ESTG/09 Agenda item: 7 e-security Task Group Submitted by: Hong Kong, China Hong Kong Post e-cert: Enabling Secure Electronic
More informationManagement Assertion Logius 2013
Logius Ministerie van Binnenlandse Zaken en koninkrijksrelaties Management Assertion Logius 2013 Date 20 March 2014 G3 G2 G3 1 Management Assertion Logius 2013 1 20 March 2014 Assertion of Management as
More informationSECURE OFFICE OF THE FUTURE
** SECURE OFFICE OF THE FUTURE HP Today Powering 430 of the Global Fortune 500 Companies Working with 250,000+ Channel Partners 18,000+ patents 2 PCs & 1 Printer ship every second HP Business Personal
More informationBetter Mutual Authentication Project
Better Mutual Authentication Project Recommendations & Requirements for Improving Web Authentication for Retail Financial Services Presented to W3C Workshop on: Transparency & Usability of Web Authentication
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationSSL Certificates Certificate Policy (CP)
SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full
More informationARM Security Solutions and Numonyx Authenticated Flash
ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware
More informationSafeGuard Easy Demo guide. Product version: 6 Document date: February 2012
SafeGuard Easy Demo guide Product version: 6 Document date: February 2012 Contents 1 Introduction...3 2 Requirements...4 3 The demo configuration package...5 4 Install the demo software...6 5 What to expect
More informationEU-R VIDEO SECURITY, DATA PROTECTION AND DATA SECURITY
EU-R P GD VIDEO SECURITY, DATA PROTECTION AND DATA SECURITY EU-GDPR quo vadis, video security? COMPANY PHILOSOPHY single source of trust. New laws: Increasing transparency requirements After a two-year
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationEnforcing Trust in Pervasive Computing. Trusted Computing Technology.
Outline with Trusted Computing Technology. Shiqun Li 1,2 Shane Balfe 3 Jianying Zhou 2 Kefei Chen 1 1 Shanghai Jiao Tong University 2 Institute for InfoComm Research 3 Royal Holloway, University of London
More informationIntroduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria
Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a
More information