Samsung has taken the lead in Trusted Computing security by enabling its semiconductor capabilities in PC, tablet and other consumer devices.
The electronics company has announced a partnership with Wave Systems to provide services and software to support Samsung’s commitment to hardware-based security.
Trusted Computing (TC) is a set of open, vendor-neutral, cross-platform specifications for hardware and software to manage and protect data and digital identities.
Developed and promoted by the Trusted Computing Group, Trusted Computing allows third parties to verify that only authorised code runs on a system.
Under the partnership agreement, Wave will provide engineering services, consulting, validation and a customised version of Wave’s local management software for Samsung’s Trusted Platform Module (TPM) security chips designed for OEM distribution.
“As businesses worldwide are seeking better security for their critical information and network access, the importance of a fundamental new approach to securing a powerful management infrastructure that ensures only authorised users on known devices are granted access or can execute critical functions has been crucial,” said Dojun Rhee, vice-president of System LSI marketing, device solutions, at Samsung Electronics.
“By combining Wave’s expertise, and strong OEM and enterprise customer relationships in Trusted Computing with Samsung’s world-leading chip design and manufacturing capabilities, Samsung will provide reliable, competitive trusted computing security chips for our customers,” he said.
The partnership with Wave will enable Samsung’s OEM customers to turn on, manage and benefit from the TPM to deliver stronger security for users and better protection for data.
“Samsung recognises the power of Trusted Computing, and this move will empower partners and customers with new, silicon-based means to provide trusted hardware on numerous platform types in the coming years,” said Brian Berger, Wave’s executive vice-president of marketing and sales.
Trusted Computing enables organisations to establish a more secure computing environment without compromising functional integrity, privacy or individual rights.
“With billions of handhelds, tablets and slates in the hands of today’s workforce, ensuring that these devices are known and trusted within the organisation is paramount,” said Eric Ouellet, analyst at research firm Gartner.
“Implementing embedded security on these devices is a major step in the right direction and will provide the foundation for preventing tomorrow’s threats and the loss of valuable corporate, employee and customer sensitive data,” he said.
The UK Information Commissioner's Office (ICO) has expressed support for Trusted Computing because of its consistency with privacy-by-design.
In October, deputy commissioner David Smith told attendees of the 2011 Trusted Computing Seminar hosted by Wave Systems in London that privacy by design was a key part of the ICO’s agenda.
The ICO is also keen to see Trusted Computing embedded in the draft European data protection law to be published in November, he said.