1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 7 April 2010 Camas, WA – PWG F2F Meeting Ira McDonald (High.

Slides:



Advertisements
Similar presentations
1Copyright © 2008, Printer Working Group. All rights reserved. Imaging Device Security (IDS) Working Group Longmont, CO - PWG F2F Meeting June 25, 2008.
Advertisements

1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary December 2010 Irvine, CA – PWG Meeting Ira McDonald (High.
1 Copyright © 2010, Printer Working Group. All rights reserved. – Page 1 WIMS WG – Status Update PWG Power Management Project 4 August 2010 Bagsvaerd,
Universal Printer Description Format, version 1.0 IEEE ISTO PWG Semantic Model Universal Printer Description Format Print Services Interface IPP IPP Fax.
1Copyright © 2011 The Printer Working Group. All rights reserved. Workgroup for Imaging Management Solutions (WIMS/PMP) April 5, 2011 Cupertino, CA PWG.
1Copyright © 2012, Printer Working Group. All rights reserved. PWG Plenary Status Report IDS Working Group August 6, 2012 Redmond, WA PWG F2F Meeting Joe.
1Copyright © 2008, Printer Working Group. All rights reserved. PWG Plenary Status Report MFD Working Group October, 2008 Lexington, KY PWG F2F Meeting.
1Copyright © 2008, Printer Working Group. All rights reserved. PWG Plenary Status Report IPP Working Group 28 April 2009 Mt Laurel, NJ - PWG F2F Meeting.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG -Imaging Device Security (IDS) Working Group Bagsværd, Denmark- PWG F2F Meeting August.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary Status Report IDS Working Group August 4, 2010 Bagsværd, Denmark- PWG F2F Meeting.
1 Copyright © 2009, Printer Working Group. All rights reserved. IPP Working Group Session 9 December 2009 Austin, TX - PWG F2F Meeting.
1Copyright © 2008, Printer Working Group. All rights reserved. PWG Plenary Status Report IPP Working Group 19 August 2009 Redmond, WA - PWG F2F Meeting.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG -Imaging Device Security (IDS) Working Group Webster, NY- PWG F2F Meeting June 11, 2010.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary and IDS WG TCG Activity Summary August 2010 Bagsvaerd, Denmark – PWG Meeting.
1Copyright © 2011, Printer Working Group. All rights reserved. PWG Plenary Status Report IDS Working Group February 2, 2011 Wailea-Makena, HI PWG F2F Meeting.
1Copyright © 2008, Printer Working Group. All rights reserved. PWG Plenary Status Report IPPv2 Working Group 18 February 2009 Waikoloa, HI - PWG F2F Meeting.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 10 June 2010 Rochester, NY – PWG F2F Meeting Ira McDonald.
1Copyright © 2011, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary May 2011 Webster, NY – PWG Meeting Ira McDonald (High North.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary Status Report Workgroup for Imaging Management Solutions (WIMS/PMP) Printer.
Copyright© 2006 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Trusted Computing David Grawrock TPM.
Encrypting Wireless Data with VPN Techniques
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
TCG Confidential Copyright© 2007 Trusted Computing Group. Picture Copyright© Jyrki Kallinen, Nokia. - Other names and brands are properties of their respective.
Introduction to mHealth in Tanzania Improving access to high quality health care Steve Ollis D-tree International.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
1Copyright © 2008, Printer Working Group. All rights reserved. PWG Imaging Device Security (IDS) Working Group Lexington, KY – P2600 Meeting October 24,
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Network Access Control for Education
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Extending user controlled security domain.
Communications & Networks National 4 & 5 Computing Science.
Communications & Networks National 4 & 5 Computing Science.
Using facilities as a data source to drive business Paul Ehrlich, PE Business Development Leader Trane Global Controls.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
IS3220 Information Technology Infrastructure Security
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Clouding with Microsoft Azure
1.4 wired and wireless networks lesson 1
Cloud-First, Modern Windows Management and Security
Date and event name can go here
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Chapter 18 MobileApp Design
Chapter 1: Exploring the Network
TCG’s Embedded System and IoT Focus
Trusted Network Connect: Open Standards for NAC
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
IIA District Conference Seminar Presenter David Cole, CPA, CISA, CRISC
IFX Forum Overview September 28, 2015 © Copyright IFX Forum, Inc
Networking and Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary 7 April 2010 Camas, WA – PWG F2F Meeting Ira McDonald (High North / Samsung) Co-Chair TCG Hardcopy WG

2Copyright © 2010, Printer Working Group. All rights reserved. TCG Overview TCG Website TCG Developer Resources TCG Description The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, industry standards for trusted computing building blocks and software interfaces across multiple platforms TCG Membership Levels TCG Promoter Member ($55,000/year) – voting TCG Contributor Member ($16,500/year) – voting TCG Adopter Member ($8,250/year) – non-voting

3Copyright © 2010, Printer Working Group. All rights reserved. TCG Workgroups TCG Workgroups Link tcg_workgroups Authentication Hardcopy Infrastructure Mobile Phone PC Client Server Specific Storage Trusted Network Connect (TNC) Trusted Platform Module (TPM) TCG Software Stack (TSS) Virtualized Platform

4Copyright © 2010, Printer Working Group. All rights reserved. TCG Media Room TCG Media Room Link TCG Press Releases and Member Releases TCG Industry News and Articles TCG Events events TCG Media Resources TCG Press Kit Documents TCG FAQs faqs

5Copyright © 2010, Printer Working Group. All rights reserved. TCG Solutions for Applications TCG Solutions Link Application – Authentication , Multi-Factor Authentication, VPN Access, Wireless Access Application – Data Protection Self-Encrypting Drives Application – Network Security Secure Guest Access, User Authentication, Endpoint Integrity, Clientless Endpoint Management, Coordinated Security

6Copyright © 2010, Printer Working Group. All rights reserved. TCG Solutions for Industries TCG Solutions Link Industry – Financial Services Data Protection, Access Control, Audit and Conformance Industry – Government (e.g., US NIST) Data Protection, Access Control, Audit and Conformance Industry – Health Care (e.g., US HIPAA) Data Protection, Access Control, Audit and Conformance

7Copyright © 2010, Printer Working Group. All rights reserved. TCG Hardcopy WG TCG Hardcopy WG – Public Charter Summary The Hardcopy Working Group (HCWG) will define open and vendor neutral technical specifications for the components of hardcopy ecosystems that use TCG components to establish their root of trust. Included will be a minimum set of functional, interface, and privacy requirements for hardcopy components. It will further satisfy requirements of scalability, owner control, and interoperability, all qualified by HCWG defined use cases. Hardcopy systems encompass a complex set of components, and are not limited to traditional direct-connected printing peripherals. The Hardcopy Working Group will define specifications for these components within the context of the complete system. TCG Hardcopy WG – Current Status Now gathering use cases, threat models, and requirements using terminology based on PWG Semantic Model (storage, interface, console, interpreter, marker, scanner, etc.)

8Copyright © 2010, Printer Working Group. All rights reserved. TCG and Cloud Computing SecureCloud 2010 – March – Barcelona SecureCloud 2010 – Presentations Link Practical Applications of Trusted Computing in the Cloud (included in the ZIP file above) – Jesus Molina (Fujitsu), Steve Hanna (Juniper) Self-Encrypting Drive – solves drive retirement issues Trusted Network Connect – solves mobile access issues Metadata Access Policy – solves user privilege issues TPM-Based Integrity Check – solves lying endpoint issues Trusted Virtual Multitenancy – solves Web hosting issues