Categories: SecurityWorkspace

Worm Holes In The Broken Global Security Network

The answer may lie inside the device

A crucial starting point for any security solution is to have a strong foundation of trust in all endpoint devices. That starts by knowing that the PC has not been changed by a third party and extends to verifying the identity of the device itself. Organisations should seriously consider adding device identity as an independently managed layer to help protect their data. This device-based security solution offers significant protection, particularly for modern day organisations where workforces and their devices are mobile and move beyond the safety of the firewall. It will also play a key role as organisations continue to move towards the Cloud and prepare to face the unique security challenges that this evolution in IT infrastructure will present.

The Trusted Platform Module (TPM), a security chip attached to a computer’s motherboard, can provide this solution. It establishes automatic and transparent authentication of known network devices and users; and, because the TPM chip is physically part of the device, it is particularly suited for creating and verifying strong device identities and ensuring only authorised access to networks.

But this type of in-device security isn’t something for the future, it’s already here. About half a billion business grade PCs and laptops are already equipped with the technology and so the chances are your organisation already has the foundations to put these solutions into place. It’s perhaps no wonder then that the framework is being championed by major organisations, enterprises and governments across the globe.

A recent survey of organisations at the Trusted Computing Seminar in London indicates that 86 percent of companies plan to explore the deployment of TPM-based solutions in 2012.

Up until now many organisations have accepted data breach and any subsequent financial loss as a ‘cost-of-business’. As a result they’ve been reluctant to explore and adopt a new security standard. However the landscape is changing as the level of threat organisations are experiencing has risen sharply and the costs in terms of financial theft, but more importantly IP theft, are becoming unsustainable.

It’s only a matter of time before action is taken and very soon, governments too will be demanding a compliance solution that is true and proven. In fact, the EU is already looking at data regulation and compliance, and is expected to issue much more stringent legislation in due course.

Joseph Souren is the General Manager at Wave Systems EMEA.

Page: 1 2

adminuk

Recent Posts

Mark Zuckerberg Lobbies Trump To Avoid Antitrust Trial – Report

Mark Zuckerberg is reportedly lobbying President Donald Trump for a settlement to avoid antitrust trial…

4 days ago

Bitcoin Slides To $81,000 In Trump Tariff Shock

As global markets reel from Trump's tariffs, the price of Bitcoin slides as investors seek…

4 days ago

Amazon’s First Project Kuiper Satellites Slated For 9 April Launch

Rival for Starlink and OneWeb. United Launch Alliance slated to send 27 Kuiper satellites into…

4 days ago

Trump’s Tariffs: Implications For Tech Sector

Semiconductor imports are free of Trump's tariff war, but concerns remain over imports of smartphones…

4 days ago

OpenAI Secures $40 Billion Funding Deal With SoftBank, Others

SoftBank has agreed a funding deal that will see OpenAI being provided with up to…

4 days ago

Tesla Sales Plummet Amid Elon Musk Backlash

Tesla sales have plummeted to lowest level in three years, as deliveries of new EVs…

5 days ago