Gemalto announced it has won the IT Security Sesames award for Just4YourEyes™. The winning innovation was distinguished at the 2011 CARTES & IDentification industry fair and is being showcased on the Gemalto booth, Hall 3, entrance. “This Sesames award recognizes Gemalto’s expertise in securing cloud computing for enterprise applications,” commented Tan Teck-Lee, Chief Innovation and…
Tag: Trusted Computing
Entrust IdentityGuard strengthens mobile security with device authentication, network access (VPN), SMIME and application security — all with self-service capabilities
In an era when mobile devices are commonplace, Entrust, Inc., introduces a straightforward method for adding digital certificates to mobile devices — and with little management from IT staff. Through Entrust's self-service module, end-users add certificates to their own mobile devices via an easy-to-use interface for advanced certificate-based authentication. "As the enterprise workplace continues to…
Infineon Security Microcontrollers Enhance Security of Google’s Chromebooks for Web-Based Applications
Infineon Technologies AG today announced that the company is shipping Trusted Platform Module (TPM) chips for devices running Google’s Chrome-based operating system. A TPM is an integral part of the security architecture of Google Chromebooks and Infineon is the first supplier of TPM chips suited for integration onto the newly available operating system for web-based…
European Research Consortium to Pilot Digital Privacy Solutions at University and Secondary School
This year, the 28th January was designated "Data Privacy Day". So it was fitting that a major research initiative was announced to pilot cryptographic technologies that enable European citizens to better protect their privacy and identities. The project, called ABC4Trust, uses privacy-enabling technology that will be piloted at a university in Greece and a secondary…
New Guide on Cyber Security Incident Management to support the fight against cyber attacks
The EU’s ‘cyber security’ Agency ENISA (the European Network and Information Security Agency) has issued a new guide on good practice, practical information and guidelines for the management of network and information security incidents by Computer Emergency Response Teams (CERTs). Recent reports of increased cyber attacks in 2010 has made the need for and use…
Finally: make use of your Trusted Platform Module
By Sven Gossel, charismathics While smart card use seems a widely accepted method to authenticate the user to the secured environment of the enterprise, people are questioning the sense of the Trusted Platform Module built onto PC motherboards. Companies bought it with practically any of the computers in use today, but hardly make use of…
UK O.K. on Trusted Computing?
By Thomas Rosteck, Infineon Technologies and Paul Waller, CESG Trust and security in networked computing and communication is a major topic for governmental, commercial and private use of modern information and communication technology. Users, enterprises and governments are using digital processes for everyday and mission critical operations in trading, communication and banking amongst others, and…
Trusted Computing for the Future
By Hans Brandl, Infineon Technologies Personal Computers (PCs) with built in Trusted Computing (TC) technology are already well known and widely distributed in the marketplace with nearly all new notebooks containing a Trusted Platform Module (TPM), which can be used to increase trust and security features in a number of daily applications. Trusted Computing (TC)…