TCG’s security guide verifies the trustworthiness of each end point

IT administrators and manufacturers can now secure enterprise computing, with the latest specification from the Trusted Computing Group (TCG). This new guide verifies the trustworthiness of each end point, by allowing the integrity of devices and networks within enterprise systems to be measured for the first time.

Read full article on Help Net Security

 


Date:

Categorie(s):