Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012.

Similar presentations


Presentation on theme: "Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012."— Presentation transcript:

1 Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012

2 So what’s the Problem with the Internet Wave Systems Corp © 2012 November 14, 2012 2

3 People are really bad solution for security User Names Passwords Don’t Work Well A New Identity Paradigm for NSTIC and You

4 The Shift Network based on Connections to Network based on Identity

5 A little history from the cellular industry Cloning Incidents Time Introduction of Device ID in cellular US Analog to Digital conversion A tamper resistant store for ID

6 Trusted Computing – Hardware Solution – Already Deployed Hardware Based Security – The Best and Brightest – Computers, Software, Silicon – Software has Proven Ineffective Based on Open Industry Standards – Non-proprietary Solution Core to Microsoft Security – Logo compliance – Business Version since Vista – Expanding to Tables and Phones in Win 8 600 Million Computers – Today – Already Deployed Why don’t I know about it - Stealth

7 Imagine Only Your Computer Can Log In To Your Accounts Trusted Platform Module (TPM) The Device Is a Powerful and Secure Attribute

8 Hardening Access – A Hardware Root of Trust You Should Have Only Known Devices On Your Network VPN and Wireless Access to Your Network Is a Vulnerability NSA demonstrated several years ago, using software purchased on the internet, it is very easy to steal the key for VPN or Wireless access and now recommends they be hardened by storage in hardware like the TPM

9 Attribute Providers Deliver the Identity Proof Device Identity & Machine Health Personal Identity

10 Trust in an NTSIC World Attribute ProvidersRelying Parties Attribute Provider Network

11 Another Twist to Consider 11 Hello  Hello All data is encrypted in transit

12 Corporate Use Case … When You Sign the NDA Wave Systems Corp © 2012 November 14, 2012 12 Encrypted Alpha CorpOmega Corp

13 Putting It All Together Delivers Value and Most all Trust Authentication of a Trusted & Healthy Device – A proven paradigm Authentication of a Users – Password to Log into Device – only once Electronic Signature – Saving money and time Encrypted Data and Text – Safe in transmission, safe when stored in the cloud – Unlocked only by authorized user(s) or groups of users – Log of who unlocked the file or text and when NSTIC is the Catalyst Moving the Industry to Higher Security and Usability NSTIC

14 14 ESIGNSYSTEMS – 13 years of passionate delivery of electronic signature and delivery systems The Most Mortgage Transactions in the Industry In-House and Hosted Solutions Professional Services for ESIGN and UETA Compliance Andrew W. Tarbox atarbox@wave.com Office: 703-448-0980 Falls Church, VA Come See Us for Solutions Kelly Purcell kpurcell@esignsystems.com Office: (602) 840-1199 Paradise Valley, AZ


Download ppt "Trusted Computing and NSTIC Andrew Tarbox Director Federal Business Wave Systems Corp November 14, 2012."

Similar presentations


Ads by Google