Eric Byres, CTO and VP of Engineering at Tofino Security, Belden Inc., walked the show floor at the NSA Trusted Computing Conference and made some interesting discoveries about the newest security hardware and software and how IF-MAP fits into it. In his blog, he shares what he found.
The Trusted Computing Group Monday announced the second version of its IF-MAP (Metadata Access Protocol) specification. According to TCG, IF-MAP describes database services with information (metadata) about systems and users currently connected to the network.
Effort will be led by the organization's new Trusted Multi-Tenant Infrastructure work group. Trusted Computing Group, which develops industry standards for hardware-based security rooted in trust, today announced a significant effort to extend the concept of trust to cloud-based computing. The effort will be led by the organization’s new Trusted Multi-Tenant Infrastructure work group.
NAC solutions are deployed in two different ways. In the first, NAC appliances -- dedicated network devices -- are used to manage end users. This is fine for small to midsize businesses or branch offices, but appliances might not scale well at the enterprise level. That's where network switches and/or server-based NAC comes in.
Trying to describe Juniper's UAC is difficult, because Juniper's NAC strategy has its tendrils in virtually every security product the company makes, from firewalls to switches to SSL VPNs
Infoblox has announced its OS1 Orchestration Server appliance that will automatically aggregate, correlate and distribute data to and from different IP connected systems.
Infoblox is extending its reach into virtualization by integrating with a virtual appliance of their IPAM appliance.
DNS specialist, Infoblox has launched a dedicated appliance aimed at connecting devices from different IP systems.