Secure servers standards launched

The Trusted Computing Group has announced an open specification for trusted servers to allow manufacturers to offer better data and transaction security.

The Trusted Computing Group has announced an open specification for trusted servers to allow manufacturers to offer better data and transaction security.

The specification launched by the industry standards body defines the architecture of a trusted server including its management, maintenance and communication between servers and clients.

It follows the announcement in May of a Trusted Network Connect (TNC) standard for authenticating and enforcing security polices on client devices that connect to corporate networks.

The trusted server is built around the Trusted Platform Module, a microchip that stores digital keys, certificates and passwords securely.

The specification supports servers based on a variety of processor architectures including x86, Intel Itanium, MIPS and Sparc processors.

It is available free of charge for manufacturers and the first trusted servers incorporating TCG building blocks are expected to be available later this year.

TCG president Jim Ward said: “The trusted server specification gives the industry an open specification to develop systems that are less prone to attack and malicious access, further strengthening the benefits of trusted clients.”

Core members of TCG include AMD, Hewlett-Packard IBM, Intel Corporation, Microsoft, Sony and Sun Microsystems.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close