Trusted Computing Adds to TNC

Trusted Computing Group adds support for java and VOIP endpoints to TNC

Dark Reading Staff, Dark Reading

February 5, 2007

1 Min Read
Dark Reading logo in a gray background | Dark Reading

SAN FRANCISCO -- The Trusted Computing Group (TCG), whose open specifications for computing security are implemented on virtually every new enterprise PC, in many vendors’ networking equipment and in servers, today announced enhancements to its Trusted Network Connect (TNC) non-proprietary specifications for network access control.

A number of companies will show trusted computing in action at RSA 2007 Booth #2643.

TNC Updates for Network Access Control

TCG’s TNC architecture provides a common framework for the collection and exchange of endpoint integrity data in heterogeneous networking environments. It is based on the concepts of integrity, or the state of the client’s “health”, and identity, in which systems are authenticated for authorized users only. For example, clients trying to connect to a network are measured and evaluated against a set of policies and pre-determined platform configurations established by their organization’s IT department. Clients not meeting pre-determined policies, such as those for patch levels, anti-virus software or operating system configuration, can be quarantined for remediation.

Trusted Computing Group

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights