Knowledge

Trusted Network Connect

Source đź“ť

22: 350: 742: 152:
In 2009 TCG announced expanded specifications which extended the specifications to systems outside of the enterprise network. Additional uses for TNC which have been reported include
849: 833: 491: 620: 880: 818: 773: 749: 701: 477: 39: 953:, nswctc, vol. 2, pp. 454–457, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010. 595: 645: 354: 446: 999: 787: 86: 856: 943: 105: 58: 929: 522: 670: 400: 831: 65: 922: 499: 43: 72: 425: 149:
in 2005. TNC was originally a network access control standard with a goal of multi-vendor endpoint policy enforcement.
936: 546: 381: 896:"Speed of cybersecurity rises with combination of Trusted Network Connect and Security Content Automation Protocols" 624: 54: 1004: 895: 153: 974: 621:"Hirsch Demonstrates Industry's First Standards-Based Network / Physical Access Control Enforcement Solution" 979: 376: 134: 32: 130: 957: 599: 649: 571: 79: 346:
The U.S. Army has planned to use this technology to enhance the security of its computer networks.
874: 812: 767: 695: 471: 453: 371: 126: 330: 269: 264: 240: 794: 837: 492:"'Trusted Network Connect' Puts Hardware Security Agent in Every PC - - - Informationweek" 320: 715: 646:"Trusted Computing Group Continues to Extend TNC Specifications | Current Analysis" 325: 230: 225: 146: 993: 677: 404: 255: 21: 950: 401:""Using Trusted Network Connect for NAC — FedTech Magazine" — FedTech Magazine" 294: 572:"Not your Father's Control System | Tofino Industrial Security Solution" 984: 951:“The Model of Trusted Network Connect Based on Credibility of the Hierarchy” 716:"TCG Trusted Network Connect : TNC IF-TNCCS: Protocol Bindings for SoH" 279: 235: 937:“Trusted Computing Group Widens Security Specs Beyond Enterprise Networks” 547:"Trusted Computing Group Widens Security Specs Beyond Enterprise Networks" 289: 220: 133:, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the 245: 366: 335: 284: 274: 193: 923:“'Trusted Network Connect' Puts Hardware Security Agent In Every PC” 351:
South Carolina Department of Probation, Parole, and Pardon Services
315: 157: 250: 15: 961: 214: 211:
A partial list of vendors who have adopted TNC Standards:
181:
IF-TNCCS - Trusted Network Connect Client-Server Interface
944:“Naked endpoints on your net, and what to do about them” 426:"Wireless Infrastructure Advice, Discussion, Community" 925:, “Information Week Magazine”, UBM Techweb Publishing. 46:. Unsourced material may be challenged and removed. 175:IF-IMC - Integrity Measurement Collector Interface 184:IF-M - Vendor-Specific IMC/IMV Messages Interface 178:IF-IMV - Integrity Measurement Verifier Interface 168:Specifications introduced by the TNC Work Group: 145:The TNC architecture was first introduced at the 541: 539: 187:IF-T - Network Authorization Transport Interface 932:, “Computer World Magazine”, IDG Publishing. 8: 357:integration combination in a pilot program. 190:IF-PEP - Policy Enforcement Point Interface 199:CESP - Clientless Endpoint Support Profile 939:, “Dark Reading”, UBM Techweb Publishing. 106:Learn how and when to remove this message 392: 879:: CS1 maint: archived copy as title ( 872: 817:: CS1 maint: archived copy as title ( 810: 772:: CS1 maint: archived copy as title ( 765: 700:: CS1 maint: archived copy as title ( 693: 476:: CS1 maint: archived copy as title ( 469: 958:“Securing SCADA and Control Networks” 596:"Securing SCADA and Control Networks" 172:TNC Architecture for Interoperability 7: 930:“Vendor Group Adds Net Access Specs” 523:"Vendor Group Adds Net Access Specs" 44:adding citations to reliable sources 14: 946:, “SC Magazine”, Haymarket Media. 196:- Metadata Access Point Interface 160:security, and physical security. 521:Vijayan, Jaikumar (2005-05-09). 20: 894:Jackson, William (2010-09-28). 31:needs additional citations for 1: 949:Fang, Juan and Zeng, Hongli. 382:Trusted Internet Connection 1021: 1000:Computer network security 154:Industrial Control System 55:"Trusted Network Connect" 975:Trusted Network Connect 956:Howard, Scott (2010-06)( 935:Higgins, Kelly Jackson. 496:www.informationweek.com 377:Trusted Computing Group 135:Trusted Computing Group 119:Trusted Network Connect 131:Network Access Control 342:TNC Customer Adoption 311:Also, networking by 40:improve this article 928:Vijayan, Jaikumar. 502:on 4 September 2012 428:. Network Computing 207:TNC Vendor Adoption 836:2011-07-16 at the 576:Tofinosecurity.com 1005:Trusted computing 372:Trusted Computing 353:has tested a TNC- 308: 307: 127:open architecture 116: 115: 108: 90: 1012: 962:“urunkoruma.com” 942:Townsend, Mark. 910: 909: 907: 906: 891: 885: 884: 878: 870: 868: 867: 861: 855:. Archived from 854: 846: 840: 829: 823: 822: 816: 808: 806: 805: 799: 793:. Archived from 792: 784: 778: 777: 771: 763: 761: 760: 754: 748:. Archived from 747: 739: 733: 732: 730: 729: 720: 712: 706: 705: 699: 691: 689: 688: 682: 676:. Archived from 675: 667: 661: 660: 658: 657: 648:. Archived from 642: 636: 635: 633: 632: 623:. Archived from 617: 611: 610: 608: 607: 598:. Archived from 592: 586: 585: 583: 582: 568: 562: 561: 559: 558: 543: 534: 533: 531: 530: 518: 512: 511: 509: 507: 498:. Archived from 488: 482: 481: 475: 467: 465: 464: 458: 452:. Archived from 451: 443: 437: 436: 434: 433: 422: 416: 415: 413: 412: 403:. Archived from 397: 331:Trapeze Networks 265:Juniper Networks 241:Extreme Networks 215: 111: 104: 100: 97: 91: 89: 48: 24: 16: 1020: 1019: 1015: 1014: 1013: 1011: 1010: 1009: 990: 989: 971: 918: 913: 904: 902: 893: 892: 888: 871: 865: 863: 859: 852: 850:"Archived copy" 848: 847: 843: 838:Wayback Machine 830: 826: 809: 803: 801: 797: 790: 788:"Archived copy" 786: 785: 781: 764: 758: 756: 752: 745: 743:"Archived copy" 741: 740: 736: 727: 725: 718: 714: 713: 709: 692: 686: 684: 680: 673: 671:"Archived copy" 669: 668: 664: 655: 653: 644: 643: 639: 630: 628: 619: 618: 614: 605: 603: 594: 593: 589: 580: 578: 570: 569: 565: 556: 554: 551:Darkreading.com 545: 544: 537: 528: 526: 525:. Computerworld 520: 519: 515: 505: 503: 490: 489: 485: 468: 462: 460: 456: 449: 447:"Archived copy" 445: 444: 440: 431: 429: 424: 423: 419: 410: 408: 399: 398: 394: 390: 363: 344: 309: 209: 166: 143: 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 1018: 1016: 1008: 1007: 1002: 992: 991: 988: 987: 982: 980:Specifications 977: 970: 969:External links 967: 966: 965: 954: 947: 940: 933: 926: 921:Dornan, Andy. 917: 914: 912: 911: 886: 841: 824: 779: 734: 707: 662: 637: 612: 587: 563: 535: 513: 483: 438: 417: 391: 389: 386: 385: 384: 379: 374: 369: 362: 359: 343: 340: 339: 338: 333: 328: 323: 318: 306: 305: 301: 300: 297: 292: 287: 282: 277: 272: 267: 260: 259: 258: 253: 248: 243: 238: 233: 231:Avenda Systems 228: 226:Aruba Networks 223: 213: 208: 205: 204: 203: 200: 197: 191: 188: 185: 182: 179: 176: 173: 165: 164:Specifications 162: 147:RSA Conference 142: 139: 114: 113: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 1017: 1006: 1003: 1001: 998: 997: 995: 986: 983: 981: 978: 976: 973: 972: 968: 963: 959: 955: 952: 948: 945: 941: 938: 934: 931: 927: 924: 920: 919: 915: 901: 897: 890: 887: 882: 876: 862:on 2006-10-03 858: 851: 845: 842: 839: 835: 832: 828: 825: 820: 814: 800:on 2011-09-30 796: 789: 783: 780: 775: 769: 755:on 2011-09-28 751: 744: 738: 735: 724: 717: 711: 708: 703: 697: 683:on 2011-01-03 679: 672: 666: 663: 652:on 2010-01-09 651: 647: 641: 638: 627:on 2009-12-30 626: 622: 616: 613: 602:on 2011-07-28 601: 597: 591: 588: 577: 573: 567: 564: 553:. 18 May 2009 552: 548: 542: 540: 536: 524: 517: 514: 501: 497: 493: 487: 484: 479: 473: 459:on 2011-07-13 455: 448: 442: 439: 427: 421: 418: 407:on 2011-07-10 406: 402: 396: 393: 387: 383: 380: 378: 375: 373: 370: 368: 365: 364: 360: 358: 356: 352: 347: 341: 337: 334: 332: 329: 327: 324: 322: 319: 317: 314: 313: 312: 304: 298: 296: 293: 291: 288: 286: 283: 281: 278: 276: 273: 271: 268: 266: 263: 262: 261: 257: 254: 252: 249: 247: 244: 242: 239: 237: 234: 232: 229: 227: 224: 222: 219: 218: 217: 216: 212: 206: 202:Federated TNC 201: 198: 195: 192: 189: 186: 183: 180: 177: 174: 171: 170: 169: 163: 161: 159: 155: 150: 148: 140: 138: 136: 132: 128: 124: 120: 110: 107: 99: 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: â€“  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 903:. Retrieved 899: 889: 864:. Retrieved 857:the original 844: 827: 802:. Retrieved 795:the original 782: 757:. Retrieved 750:the original 737: 726:. Retrieved 722: 710: 685:. Retrieved 678:the original 665: 654:. Retrieved 650:the original 640: 629:. Retrieved 625:the original 615: 604:. Retrieved 600:the original 590: 579:. Retrieved 575: 566: 555:. Retrieved 550: 527:. Retrieved 516: 504:. Retrieved 500:the original 495: 486: 461:. Retrieved 454:the original 441: 430:. Retrieved 420: 409:. Retrieved 405:the original 395: 348: 345: 310: 302: 299:Wave Systems 256:Pulse Secure 210: 167: 151: 144: 122: 118: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 994:Categories 905:2017-05-03 866:2006-08-05 804:2010-10-14 759:2010-10-14 728:2017-05-03 687:2010-10-14 656:2010-09-15 631:2010-10-14 606:2010-09-13 581:2017-05-03 557:2017-05-03 529:2017-05-03 506:3 February 463:2010-10-20 432:2017-05-03 411:2010-10-14 388:References 295:strongSwan 66:newspapers 723:Opus1.com 280:Microsoft 236:Enterasys 875:cite web 834:Archived 813:cite web 768:cite web 696:cite web 472:cite web 361:See also 326:Symantec 290:ProCurve 221:ArcSight 125:) is an 96:May 2017 985:TNC SDK 916:Sources 900:Fcw.com 246:Fujitsu 156:(ICS), 141:History 137:(TCG). 80:scholar 367:IF-MAP 336:Tofino 303: 285:Nortel 275:McAfee 270:Lumeta 194:IF-MAP 82:  75:  68:  61:  53:  860:(PDF) 853:(PDF) 798:(PDF) 791:(PDF) 753:(PDF) 746:(PDF) 719:(PDF) 681:(PDF) 674:(PDF) 457:(PDF) 450:(PDF) 316:Cisco 158:SCADA 87:JSTOR 73:books 881:link 819:link 774:link 702:link 508:2022 478:link 355:SCAP 349:The 129:for 59:news 960:, 251:IBM 123:TNC 42:by 996:: 898:. 877:}} 873:{{ 815:}} 811:{{ 770:}} 766:{{ 721:. 698:}} 694:{{ 574:. 549:. 538:^ 494:. 474:}} 470:{{ 321:HP 964:. 908:. 883:) 869:. 821:) 807:. 776:) 762:. 731:. 704:) 690:. 659:. 634:. 609:. 584:. 560:. 532:. 510:. 480:) 466:. 435:. 414:. 121:( 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Trusted Network Connect"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
open architecture
Network Access Control
Trusted Computing Group
RSA Conference
Industrial Control System
SCADA
IF-MAP
ArcSight
Aruba Networks
Avenda Systems
Enterasys
Extreme Networks
Fujitsu
IBM
Pulse Secure
Juniper Networks
Lumeta
McAfee
Microsoft

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑