Utimaco Enables the Use of Trusted Hardware Platforms for Secure Mobile Computing

Utimaco enables the Use of Trusted Hardware Platforms for Secure Mobile Computing San Francisco, February 17, 2004 – At this year’s IDF (Intel Developer Forum, 17th to 19th February 2004, San Francisco, CA) and RSA Conference (23rd to 27th February 2004, San Francisco) Utimaco Safeware will exhibit security solutions from its SafeGuard product family for the new generation of PCs and laptops with an integrated TPM (trusted platform module) security chip.

Utimaco’s security solutions for encrypting data saved locally, or on a network, uses the TPM chip, and also IBM’s ESS (Embedded Security Subsystem) which has been developed for this platform. This combination of integrated security hardware and data encryption provides customers in enterprise environments with basic protection for PCs and laptops, which also allows these devices to be used in insecure environments such as mobile computing. Even if the devices are lost or stolen, the saved data cannot be accessed by unauthorised users, since it is protected by encryption. The security chip prevents the keys by hardware from being read, and ensures that the saved data can only be read on an authorised device. This means that in-house staff cannot copy hard disks and then read their contents on other devices, even if they know the password.

Utimaco’s product portfolio can be used to encrypt virtual disks (SafeGuard PrivateDisk), files and folders locally and on the network (SafeGuard LAN Crypt) or entire hard disks (SafeGuard Easy), depending on the needs of the security concept.

At the IDF and RSA Conference, Utimaco Safeware’s product portfolio for secure mobile computing will be presented at the TCG Areas by Utimaco and IBM.

The market research firm IDC expects that the market share of laptops in the global PC market will increase from 27.5% in 2003 to 44.3% in 2006. The accelerators for this development are Intel’s new Pentium? M energy- saving mobile processors, and integrated WLAN functions, as used by Intel in its Intel? Centrino mobile technology design. Another important factor that increases the acceptance of mobile devices in enterprise environments is the ability to protect data saved on those devices from unauthorised access, since mobile devices are easily lost or stolen. According to a study by CSI, the american Computer Security Institute, in collaboration with the FBI, laptop theft was the second most common computer crime in 2003. The company most affected by this kind of theft suffered damages equalling 5 million dollars.

In a statement, Intel’s David Grawrock, Senior Security Architect, said “Mobile computing needs security concepts which ensures that data is not only encrypted during transmission over a network, but also when stored on mobile devices, which are getting smaller and smaller as time goes on.”

“Services and applications based on the Trusted Platform Module give users more choices in security and allow them to travel and use their mobile PCs with confidence,” noted Jim Ward, chairman, Trusted Computing Group.

The TPM security chip is the core of a new security architecture intended to improve computer security through trusted hardware. IBM, the leading hardware manufacturer, supplies this security chip as a standard element of the ESS Embedded Security Subsystem in most of its models, especially in its laptop ranges. Like an “internal smart card” TPM makes it possible to protectingly save and process particularly critical information such as keys and passwords. For the first time, machines can also be uniquely identified on networks, when TPM is in use.

Utimaco Safeware AG is one of the leading European manufacturers of professional IT security solutions. The security technology and solutions developed by Utimaco Safeware protect the electronic data of companies and government bodies against unauthorised access and guarantee that business processes and administrative procedures in the electronic world are binding and confidential. Utimaco Safeware’s Personal Device Security division supplies technologies and solutions for mobile security in the areas of high-level authentication including biometric techniques, encryption and integrity checks. Its products and solutions secure data in terminal server and Citrix environments, on the PC, laptop and PDA at the workplace, and on the move.

*Intel and Intel Centrino are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

Don't miss