Tag Archives: Trusted Computing

Cartes 2011: Gemalto’s Just4YourEyes™ applauded for convenient and portable cloud computing security

Gemalto announced it has won the IT Security Sesames award for Just4YourEyes™. The winning innovation was distinguished at the 2011 CARTES & IDentification industry fair and is being showcased on the Gemalto booth, Hall 3, entrance. “This Sesames award recognizes Gemalto’s expertise in securing cloud computing for enterprise applications,” commented Tan Teck-Lee, Chief Innovation and […]

Continue Reading

Entrust IdentityGuard strengthens mobile security with device authentication, network access (VPN), SMIME and application security — all with self-service capabilities

In an era when mobile devices are commonplace, Entrust, Inc., introduces a straightforward method for adding digital certificates to mobile devices — and with little management from IT staff. Through Entrust’s self-service module, end-users add certificates to their own mobile devices via an easy-to-use interface for advanced certificate-based authentication. “As the enterprise workplace continues to […]

Continue Reading

Infineon Security Microcontrollers Enhance Security of Google’s Chromebooks for Web-Based Applications

Infineon Technologies AG today announced that the company is shipping Trusted Platform Module (TPM) chips for devices running Google’s Chrome-based operating system. A TPM is an integral part of the security architecture of Google Chromebooks and Infineon is the first supplier of TPM chips suited for integration onto the newly available operating system for web-based […]

Continue Reading

European Research Consortium to Pilot Digital Privacy Solutions at University and Secondary School

This year, the 28th January was designated “Data Privacy Day”. So it was fitting that a major research initiative was announced to pilot cryptographic technologies that enable European citizens to better protect their privacy and identities. The project, called ABC4Trust, uses privacy-enabling technology that will be piloted at a university in Greece and a secondary […]

Continue Reading

New Guide on Cyber Security Incident Management to support the fight against cyber attacks

The EU’s ‘cyber security’ Agency ENISA (the European Network and Information Security Agency) has issued a new guide on good practice, practical information and guidelines for the management of network and information security incidents by Computer Emergency Response Teams (CERTs). Recent reports of increased cyber attacks in 2010 has made the need for and use […]

Continue Reading

Finally: make use of your Trusted Platform Module

By Sven Gossel, charismathics While smart card use seems a widely accepted method to authenticate the user to the secured environment of the enterprise, people are questioning the sense of the Trusted Platform Module built onto PC motherboards. Companies bought it with practically any of the computers in use today, but hardly make use of […]

Continue Reading

UK O.K. on Trusted Computing?

By Thomas Rosteck, Infineon Technologies and Paul Waller, CESG Trust and security in networked computing and communication is a major topic for governmental, commercial and private use of modern information and communication technology. Users, enterprises and governments are using digital processes for everyday and mission critical operations in trading, communication and banking amongst others, and […]

Continue Reading

Trusted Computing for the Future

By Hans Brandl, Infineon Technologies Personal Computers (PCs) with built in Trusted Computing (TC) technology are already well known and widely distributed in the marketplace with nearly all new notebooks containing a Trusted Platform Module (TPM), which can be used to increase trust and security features in a number of daily applications. Trusted Computing (TC) […]

Continue Reading