Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.



Similar documents
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Dell Client. Take Control of Your Environment. Powered by Intel Core 2 processor with vpro technology

Trusted Computing Basics: Self-Encrypting Drives

Implementing Hardware Roots of Trust: The Trusted Platform Module Comes of Age Sponsored by the Trusted Computing Group (TCG)

Commercially Proven Trusted Computing Solutions RSA 2010

Why Dell for EUC. JinCheol Park EUC Marketing Nov. 25 th, 2014

Enhancing Organizational Security Through the Use of Virtual Smart Cards

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

A Guide to Managing Microsoft BitLocker in the Enterprise

Samsung SED Security in Collaboration with Wave Systems

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Management of Hardware Passwords in Think PCs.

FDE Performance Comparison. Hardware Versus Software Full Drive Encryption

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Software Token Security & Provisioning: Innovation Galore!

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

BitLocker Encryption for non-tpm laptops

TPM for Dell Business Clients Using Self Contained Executable. A Dell Technical White Paper

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Case Study: Leveraging TPM for Authentication and Key Security

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Do you know what makes NetSupport Manager so unique?

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Remote Desktop Services

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Get Success in Passing Your Certification Exam at first attempt!

Innovative Secure Boot System (SBS) with a smartcard.

Managing BitLocker Encryption

Managing BitLocker With SafeGuard Enterprise

Check Point FDE integration with Digipass Key devices

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Encryption as a Cloud Service provides the lowest TCO

MBAM Self-Help Portals

Symantec Endpoint Encryption Full Disk Release Notes

Disk Encryption. Aaron Howard IT Security Office

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Data Security Using TCG Self-Encrypting Drive Technology

Chapter 1: Introduction

WHITE PAPER. Mobile Document Management. with eakte2go*

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Full version is >>> HERE <<<

Encrypting with BitLocker for disk volumes under Windows 7

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Navigating Endpoint Encryption Technologies

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Yale Software Library

Full Disk Encryption Agent Reference

Symantec Endpoint Encryption Full Disk Release Notes

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

SafeGuard Enterprise User help. Product version: 6.1

DigitalPersona, Inc. Creating the authentication infrastructure for a digital world.

whitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment

Session ID: Session Classification:

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Section 12 MUST BE COMPLETED BY: 4/22

Full Drive Encryption with Samsung Solid State Drives

Solid-State Drives with Self-Encryption: Solidly Secure

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

IT Firm Upgrades Operating System to Reduce Costs, Enhance Security and Productivity

Two factor strong authentication. Complex solution for two factor strong authentication

MaaS360 Mobile Service

PC Solutions That Mean Business

Kaseya IT Automation Framework

ACER ProShield. Table of Contents

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Windows 7. Qing Liu Michael Stevens

Operating System Security

Installing and Upgrading to Windows 7

Guidelines on use of encryption to protect person identifiable and sensitive information

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Secure Virtual Assist/ Access/Meeting

Customer Whitepaper. Motion Tablet PC Security Basics. Table of Contents. Whitepaper Goals and Intended Audience...2

HP Commercial Notebook BIOS Password Setup

SafeGuard Enterprise User help. Product version: 6 Document date: February 2012

Transcription:

Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp.

The challenge We are having a little problem with identity and data theft. It is time to reduce the attack profile. It has been done before. Hardware security is a key component 2

Trusted Computing Group (TCG) Developing Open Industry Standards Desktops PC Client & Notebooks Work Group TIS 1.1, 1.2 Applications TSS Work Group TSS 1.1, 1.2 Mobile Phones Mobile Phone Work Group Mobile Trust Module 1.0 Networking Applications Trusted Network Connect Work Group TNC 1.0, 1.1 TCG Standards Security Hardware TPM Work Group TPM 1.1b, 1.2 Storage Storage Work Group OPAL 1.0 Servers Server Work Group Server 1.0 3

Trusted Computing in Action Factory-Installed Self-Encrypting Drives Optional on Dell Latitude, Optiplex and Precision Workstations Latitude E4200, 4300, 5400, 5500, 6400 and 6500 Latitude D530, 531, 631 and 830 Precision M2400, 4400, 6400, T3500, 5400, 7400 Optiplex 760, 960 Supported on select Lenovo and HP machines TCG s Opal Self-Encrypting Drive Specification (2/09) Seagate Drives have NSA National Security System Approval All PCs should be procured with Self Encrypting Drives Compliance Regulations are Driving Adoption 4

Self-Encrypting Drives Changing the Landscape of Data Encryption Strong Specifications for attached storage Should apply to all USB data storage Moves PC authentication to PRE OS Integrated Support for multiple Authentication factors Card Password Network TPM Data protection in hardware is the right architecture 5

Trusted Computing in Action Over 300 Million TPMs Virtually all business grade laptops and desktops include TPMs as part of their standard configuration Tier 1 Dell, HP, Lenovo Tier 2 Acer, Fujitsu, Sony, Toshiba US Government agencies are mandating TPMs Air Force Mainstream Buying Standards requires TPM 1.2 Army requires TPM 1.2 for all new Window s PCs OSD Mandates TPM on all new PCs Integration within Intel vpro chipset itpm Microsoft Vista leverages TPM for enhanced security BitLocker - Integrated FDE that utilizes a TPM Gartner strongly recommends using a TPM TPM install base is headed towards ubiquity TPM aware applications are entering the market 6

Top 5 uses for TPM in the enterprise Secure all soft credentials in the enterprise VPN keys already supports most VPN systems Wireless access 802.1x and all credential access systems Machine identity Tamper resistant device identity OS independent. The fist step of any Network Access Control (NAC) system Windows user authentication All Web portal access control no more passwords Require TPM support for all third-party SAAS 7

Why every identity system should support TPM Just like Ethernet, USB and CD-ROM, everyone has a TPM or is getting one. Microsoft Vista and Intel vpro logo compliance Over 300 million shipped It s easy to support Looks like a PKI USB or smart card token Web server discoverable No authentication vendor lock-in Multiple hardware vendors Multiple software vendors Strong standards body Every user will want all the parts to work together When on my PC the TPM is my identity container When on the Road my Smartcard has related identity When on my Phone the phone has my credentials on board. 8

Start Simple with the TPM TPM 101 Authentication First Machine Authentication User Authentication TPM 201 Machine Integrity Measure Bios Measure some apps Remediation. TPM 301 Trustworthy Execution We are still making the parts work well together High Assurance Platform Start today it s getting harder to keep up 9

Our Vision. In the future You will log into your PC and your PC will log you into everything else. Only authorized PCs Will be on my network and I can definitively identify them all. The will be no more pictures of frosted doughnuts to log into my bank. When My PC is un-attended or lost my data is Safe. We are just getting started! Come join the party and secure the PC and the network. 10

Factory-Installed Hardware Simplifies Security DEPLOY FASTER Factory installed features Hardware based solutions PROTECT BETTER Managed security Flexible & strong access control Hardware Full Disk Encryption PREVENT SMARTER Standard based Broadly used solutions Leverage facilities infrastructures

Thank You Steven Sprague CEO Wave Systems Corp. Ssprague@wavesys.com