Open specification to aid PC server security

The Trusted Computing Group has announced an open specification for trusted servers to allow manufacturers to improve hardware security on PC servers.

The Trusted Computing Group has announced an open specification for trusted servers to allow manufacturers to improve hardware security on PC servers.

The standards group's specification defines the architecture of a trusted server, including its management, maintenance and communication between servers and clients.

It follows the announcement in May of the Trusted Network Connect standard for enforcing security policies on client devices that connect to corporate networks.

The trusted server is built around the Trusted Platform Module, a microchip that stores digital keys, certificates and passwords securely. The specification supports servers based on a variety of processor architectures, including x86, Intel Itanium, Mips and Sparc processors.

It is available free of charge for manufacturers, and the first servers incorporating the specification are expected later this year.

Trusted Computing Group president Jim Ward said, "The trusted server specification gives the industry an open specification to develop systems that are less prone to attack and malicious access, further strengthening the benefits of trusted clients."

Membership of the Trusted Computing Group includes IBM, AMD, Hewlett-Packard, Intel, Microsoft, Sony and Sun Microsystems.

 

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Antivirus, firewall and IDS products

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close