Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp.
The challenge We are having a little problem with identity and data theft. It is time to reduce the attack profile. It has been done before. Hardware security is a key component 2
Trusted Computing Group (TCG) Developing Open Industry Standards Desktops PC Client & Notebooks Work Group TIS 1.1, 1.2 Applications TSS Work Group TSS 1.1, 1.2 Mobile Phones Mobile Phone Work Group Mobile Trust Module 1.0 Networking Applications Trusted Network Connect Work Group TNC 1.0, 1.1 TCG Standards Security Hardware TPM Work Group TPM 1.1b, 1.2 Storage Storage Work Group OPAL 1.0 Servers Server Work Group Server 1.0 3
Trusted Computing in Action Factory-Installed Self-Encrypting Drives Optional on Dell Latitude, Optiplex and Precision Workstations Latitude E4200, 4300, 5400, 5500, 6400 and 6500 Latitude D530, 531, 631 and 830 Precision M2400, 4400, 6400, T3500, 5400, 7400 Optiplex 760, 960 Supported on select Lenovo and HP machines TCG s Opal Self-Encrypting Drive Specification (2/09) Seagate Drives have NSA National Security System Approval All PCs should be procured with Self Encrypting Drives Compliance Regulations are Driving Adoption 4
Self-Encrypting Drives Changing the Landscape of Data Encryption Strong Specifications for attached storage Should apply to all USB data storage Moves PC authentication to PRE OS Integrated Support for multiple Authentication factors Card Password Network TPM Data protection in hardware is the right architecture 5
Trusted Computing in Action Over 300 Million TPMs Virtually all business grade laptops and desktops include TPMs as part of their standard configuration Tier 1 Dell, HP, Lenovo Tier 2 Acer, Fujitsu, Sony, Toshiba US Government agencies are mandating TPMs Air Force Mainstream Buying Standards requires TPM 1.2 Army requires TPM 1.2 for all new Window s PCs OSD Mandates TPM on all new PCs Integration within Intel vpro chipset itpm Microsoft Vista leverages TPM for enhanced security BitLocker - Integrated FDE that utilizes a TPM Gartner strongly recommends using a TPM TPM install base is headed towards ubiquity TPM aware applications are entering the market 6
Top 5 uses for TPM in the enterprise Secure all soft credentials in the enterprise VPN keys already supports most VPN systems Wireless access 802.1x and all credential access systems Machine identity Tamper resistant device identity OS independent. The fist step of any Network Access Control (NAC) system Windows user authentication All Web portal access control no more passwords Require TPM support for all third-party SAAS 7
Why every identity system should support TPM Just like Ethernet, USB and CD-ROM, everyone has a TPM or is getting one. Microsoft Vista and Intel vpro logo compliance Over 300 million shipped It s easy to support Looks like a PKI USB or smart card token Web server discoverable No authentication vendor lock-in Multiple hardware vendors Multiple software vendors Strong standards body Every user will want all the parts to work together When on my PC the TPM is my identity container When on the Road my Smartcard has related identity When on my Phone the phone has my credentials on board. 8
Start Simple with the TPM TPM 101 Authentication First Machine Authentication User Authentication TPM 201 Machine Integrity Measure Bios Measure some apps Remediation. TPM 301 Trustworthy Execution We are still making the parts work well together High Assurance Platform Start today it s getting harder to keep up 9
Our Vision. In the future You will log into your PC and your PC will log you into everything else. Only authorized PCs Will be on my network and I can definitively identify them all. The will be no more pictures of frosted doughnuts to log into my bank. When My PC is un-attended or lost my data is Safe. We are just getting started! Come join the party and secure the PC and the network. 10
Factory-Installed Hardware Simplifies Security DEPLOY FASTER Factory installed features Hardware based solutions PROTECT BETTER Managed security Flexible & strong access control Hardware Full Disk Encryption PREVENT SMARTER Standard based Broadly used solutions Leverage facilities infrastructures
Thank You Steven Sprague CEO Wave Systems Corp. Ssprague@wavesys.com