22:
350:
742:
152:
In 2009 TCG announced expanded specifications which extended the specifications to systems outside of the enterprise network. Additional uses for TNC which have been reported include
849:
833:
491:
620:
880:
818:
773:
749:
701:
477:
39:
953:, nswctc, vol. 2, pp. 454–457, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, 2010.
595:
645:
354:
446:
999:
787:
86:
856:
943:
105:
58:
929:
522:
670:
400:
831:
65:
922:
499:
43:
72:
425:
149:
in 2005. TNC was originally a network access control standard with a goal of multi-vendor endpoint policy enforcement.
936:
546:
381:
896:"Speed of cybersecurity rises with combination of Trusted Network Connect and Security Content Automation Protocols"
624:
54:
1004:
895:
153:
974:
621:"Hirsch Demonstrates Industry's First Standards-Based Network / Physical Access Control Enforcement Solution"
979:
376:
134:
32:
130:
957:
599:
649:
571:
79:
346:
The U.S. Army has planned to use this technology to enhance the security of its computer networks.
874:
812:
767:
695:
471:
453:
371:
126:
330:
269:
264:
240:
794:
837:
492:"'Trusted Network Connect' Puts Hardware Security Agent in Every PC - - - Informationweek"
320:
715:
646:"Trusted Computing Group Continues to Extend TNC Specifications | Current Analysis"
325:
230:
225:
146:
993:
677:
404:
255:
21:
950:
401:""Using Trusted Network Connect for NAC — FedTech Magazine" — FedTech Magazine"
294:
572:"Not your Father's Control System | Tofino Industrial Security Solution"
984:
951:“The Model of Trusted Network Connect Based on Credibility of the Hierarchy”
716:"TCG Trusted Network Connect : TNC IF-TNCCS: Protocol Bindings for SoH"
279:
235:
937:“Trusted Computing Group Widens Security Specs Beyond Enterprise Networks”
547:"Trusted Computing Group Widens Security Specs Beyond Enterprise Networks"
289:
220:
133:, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the
245:
366:
335:
284:
274:
193:
923:“'Trusted Network Connect' Puts Hardware Security Agent In Every PC”
351:
South
Carolina Department of Probation, Parole, and Pardon Services
315:
157:
250:
15:
961:
214:
211:
A partial list of vendors who have adopted TNC Standards:
181:
IF-TNCCS - Trusted
Network Connect Client-Server Interface
944:“Naked endpoints on your net, and what to do about them”
426:"Wireless Infrastructure Advice, Discussion, Community"
925:, “Information Week Magazine”, UBM Techweb Publishing.
46:. Unsourced material may be challenged and removed.
175:IF-IMC - Integrity Measurement Collector Interface
184:IF-M - Vendor-Specific IMC/IMV Messages Interface
178:IF-IMV - Integrity Measurement Verifier Interface
168:Specifications introduced by the TNC Work Group:
145:The TNC architecture was first introduced at the
541:
539:
187:IF-T - Network Authorization Transport Interface
932:, “Computer World Magazine”, IDG Publishing.
8:
357:integration combination in a pilot program.
190:IF-PEP - Policy Enforcement Point Interface
199:CESP - Clientless Endpoint Support Profile
939:, “Dark Reading”, UBM Techweb Publishing.
106:Learn how and when to remove this message
392:
879:: CS1 maint: archived copy as title (
872:
817:: CS1 maint: archived copy as title (
810:
772:: CS1 maint: archived copy as title (
765:
700:: CS1 maint: archived copy as title (
693:
476:: CS1 maint: archived copy as title (
469:
958:“Securing SCADA and Control Networks”
596:"Securing SCADA and Control Networks"
172:TNC Architecture for Interoperability
7:
930:“Vendor Group Adds Net Access Specs”
523:"Vendor Group Adds Net Access Specs"
44:adding citations to reliable sources
14:
946:, “SC Magazine”, Haymarket Media.
196:- Metadata Access Point Interface
160:security, and physical security.
521:Vijayan, Jaikumar (2005-05-09).
20:
894:Jackson, William (2010-09-28).
31:needs additional citations for
1:
949:Fang, Juan and Zeng, Hongli.
382:Trusted Internet Connection
1021:
1000:Computer network security
154:Industrial Control System
55:"Trusted Network Connect"
975:Trusted Network Connect
956:Howard, Scott (2010-06)(
935:Higgins, Kelly Jackson.
496:www.informationweek.com
377:Trusted Computing Group
135:Trusted Computing Group
119:Trusted Network Connect
131:Network Access Control
342:TNC Customer Adoption
311:Also, networking by
40:improve this article
928:Vijayan, Jaikumar.
502:on 4 September 2012
428:. Network Computing
207:TNC Vendor Adoption
836:2011-07-16 at the
576:Tofinosecurity.com
1005:Trusted computing
372:Trusted Computing
353:has tested a TNC-
308:
307:
127:open architecture
116:
115:
108:
90:
1012:
962:“urunkoruma.com”
942:Townsend, Mark.
910:
909:
907:
906:
891:
885:
884:
878:
870:
868:
867:
861:
855:. Archived from
854:
846:
840:
829:
823:
822:
816:
808:
806:
805:
799:
793:. Archived from
792:
784:
778:
777:
771:
763:
761:
760:
754:
748:. Archived from
747:
739:
733:
732:
730:
729:
720:
712:
706:
705:
699:
691:
689:
688:
682:
676:. Archived from
675:
667:
661:
660:
658:
657:
648:. Archived from
642:
636:
635:
633:
632:
623:. Archived from
617:
611:
610:
608:
607:
598:. Archived from
592:
586:
585:
583:
582:
568:
562:
561:
559:
558:
543:
534:
533:
531:
530:
518:
512:
511:
509:
507:
498:. Archived from
488:
482:
481:
475:
467:
465:
464:
458:
452:. Archived from
451:
443:
437:
436:
434:
433:
422:
416:
415:
413:
412:
403:. Archived from
397:
331:Trapeze Networks
265:Juniper Networks
241:Extreme Networks
215:
111:
104:
100:
97:
91:
89:
48:
24:
16:
1020:
1019:
1015:
1014:
1013:
1011:
1010:
1009:
990:
989:
971:
918:
913:
904:
902:
893:
892:
888:
871:
865:
863:
859:
852:
850:"Archived copy"
848:
847:
843:
838:Wayback Machine
830:
826:
809:
803:
801:
797:
790:
788:"Archived copy"
786:
785:
781:
764:
758:
756:
752:
745:
743:"Archived copy"
741:
740:
736:
727:
725:
718:
714:
713:
709:
692:
686:
684:
680:
673:
671:"Archived copy"
669:
668:
664:
655:
653:
644:
643:
639:
630:
628:
619:
618:
614:
605:
603:
594:
593:
589:
580:
578:
570:
569:
565:
556:
554:
551:Darkreading.com
545:
544:
537:
528:
526:
525:. Computerworld
520:
519:
515:
505:
503:
490:
489:
485:
468:
462:
460:
456:
449:
447:"Archived copy"
445:
444:
440:
431:
429:
424:
423:
419:
410:
408:
399:
398:
394:
390:
363:
344:
309:
209:
166:
143:
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
1018:
1016:
1008:
1007:
1002:
992:
991:
988:
987:
982:
980:Specifications
977:
970:
969:External links
967:
966:
965:
954:
947:
940:
933:
926:
921:Dornan, Andy.
917:
914:
912:
911:
886:
841:
824:
779:
734:
707:
662:
637:
612:
587:
563:
535:
513:
483:
438:
417:
391:
389:
386:
385:
384:
379:
374:
369:
362:
359:
343:
340:
339:
338:
333:
328:
323:
318:
306:
305:
301:
300:
297:
292:
287:
282:
277:
272:
267:
260:
259:
258:
253:
248:
243:
238:
233:
231:Avenda Systems
228:
226:Aruba Networks
223:
213:
208:
205:
204:
203:
200:
197:
191:
188:
185:
182:
179:
176:
173:
165:
164:Specifications
162:
147:RSA Conference
142:
139:
114:
113:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
1017:
1006:
1003:
1001:
998:
997:
995:
986:
983:
981:
978:
976:
973:
972:
968:
963:
959:
955:
952:
948:
945:
941:
938:
934:
931:
927:
924:
920:
919:
915:
901:
897:
890:
887:
882:
876:
862:on 2006-10-03
858:
851:
845:
842:
839:
835:
832:
828:
825:
820:
814:
800:on 2011-09-30
796:
789:
783:
780:
775:
769:
755:on 2011-09-28
751:
744:
738:
735:
724:
717:
711:
708:
703:
697:
683:on 2011-01-03
679:
672:
666:
663:
652:on 2010-01-09
651:
647:
641:
638:
627:on 2009-12-30
626:
622:
616:
613:
602:on 2011-07-28
601:
597:
591:
588:
577:
573:
567:
564:
553:. 18 May 2009
552:
548:
542:
540:
536:
524:
517:
514:
501:
497:
493:
487:
484:
479:
473:
459:on 2011-07-13
455:
448:
442:
439:
427:
421:
418:
407:on 2011-07-10
406:
402:
396:
393:
387:
383:
380:
378:
375:
373:
370:
368:
365:
364:
360:
358:
356:
352:
347:
341:
337:
334:
332:
329:
327:
324:
322:
319:
317:
314:
313:
312:
304:
298:
296:
293:
291:
288:
286:
283:
281:
278:
276:
273:
271:
268:
266:
263:
262:
261:
257:
254:
252:
249:
247:
244:
242:
239:
237:
234:
232:
229:
227:
224:
222:
219:
218:
217:
216:
212:
206:
202:Federated TNC
201:
198:
195:
192:
189:
186:
183:
180:
177:
174:
171:
170:
169:
163:
161:
159:
155:
150:
148:
140:
138:
136:
132:
128:
124:
120:
110:
107:
99:
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
903:. Retrieved
899:
889:
864:. Retrieved
857:the original
844:
827:
802:. Retrieved
795:the original
782:
757:. Retrieved
750:the original
737:
726:. Retrieved
722:
710:
685:. Retrieved
678:the original
665:
654:. Retrieved
650:the original
640:
629:. Retrieved
625:the original
615:
604:. Retrieved
600:the original
590:
579:. Retrieved
575:
566:
555:. Retrieved
550:
527:. Retrieved
516:
504:. Retrieved
500:the original
495:
486:
461:. Retrieved
454:the original
441:
430:. Retrieved
420:
409:. Retrieved
405:the original
395:
348:
345:
310:
302:
299:Wave Systems
256:Pulse Secure
210:
167:
151:
144:
122:
118:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
994:Categories
905:2017-05-03
866:2006-08-05
804:2010-10-14
759:2010-10-14
728:2017-05-03
687:2010-10-14
656:2010-09-15
631:2010-10-14
606:2010-09-13
581:2017-05-03
557:2017-05-03
529:2017-05-03
506:3 February
463:2010-10-20
432:2017-05-03
411:2010-10-14
388:References
295:strongSwan
66:newspapers
723:Opus1.com
280:Microsoft
236:Enterasys
875:cite web
834:Archived
813:cite web
768:cite web
696:cite web
472:cite web
361:See also
326:Symantec
290:ProCurve
221:ArcSight
125:) is an
96:May 2017
985:TNC SDK
916:Sources
900:Fcw.com
246:Fujitsu
156:(ICS),
141:History
137:(TCG).
80:scholar
367:IF-MAP
336:Tofino
303:
285:Nortel
275:McAfee
270:Lumeta
194:IF-MAP
82:
75:
68:
61:
53:
860:(PDF)
853:(PDF)
798:(PDF)
791:(PDF)
753:(PDF)
746:(PDF)
719:(PDF)
681:(PDF)
674:(PDF)
457:(PDF)
450:(PDF)
316:Cisco
158:SCADA
87:JSTOR
73:books
881:link
819:link
774:link
702:link
508:2022
478:link
355:SCAP
349:The
129:for
59:news
960:,
251:IBM
123:TNC
42:by
996::
898:.
877:}}
873:{{
815:}}
811:{{
770:}}
766:{{
721:.
698:}}
694:{{
574:.
549:.
538:^
494:.
474:}}
470:{{
321:HP
964:.
908:.
883:)
869:.
821:)
807:.
776:)
762:.
731:.
704:)
690:.
659:.
634:.
609:.
584:.
560:.
532:.
510:.
480:)
466:.
435:.
414:.
121:(
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.