Endpoint Security Assured With Latest TrustConnector Release From

2 November, 2005. Phoenix Technologies Ltd. has announced the availability of TrustConnector 2, an industry-leading endpoint security application that prevents attackers from accessing protected systems even if they have valid IDs and passwords. Creating a unique identity for each device that cannot be altered or stolen, TrustConnector leverages existing security investments while allowing appropriate levels of access from an organisation’s entire installed base of trusted devices.

“As attacks become more sophisticated, device identity is a critical component of endpoint security,” said Roger Kay, president of Endpoint Technologies Associates. “Device identity is complementary to user identity. By putting the two together, companies can greatly reduce the risk of either unauthenticated devices or rogue users entering the network and causing damage.”

User Authentication is Not Enough – Device Identification is Critical

A study of computer crimes prosecuted by the Criminal Division of the US Department of Justice between March 1998 and February 2005 showed that 82 percent of attackers accessed protected systems that had a known and finite number of authorised users and devices. If the penetrated systems had been able to verify that a device requesting access was one of the authorised devices, more than 80 percent of the crimes would have been prevented.

“The sophistication and number of network attacks are growing as the assets on the network are getting more sensitive and valuable. Now more than ever, organisations must protect these assets, particularly their financial systems, company trade secrets, customer and personnel records, private information and regulated data – and that protection begins at the device level,” said Albert E. Sisto, chairman, president and CEO, Phoenix Technologies Ltd. “TrustConnector delivers the most effective solution for endpoint security with the least amount of intrusion on existing processes.”

With user authentication alone, thieves with stolen user credentials can access the network from any device. Even systems protected by strong user authentication can be vulnerable, particularly when insiders share one-time pass codes or digital keys. In addition, employees with valid credentials can access the network with unknown, unmanaged devices that can threaten the network with spyware, adware, Trojans and other malware.

TrustConnector allows only authorised devices access to networks, applications and data. The software supports devices such as PCs, handheld computers, smartphones and other intelligent devices equipped with x86 chips. TrustConnector creates a device identity key, which assures a unique identity for every device. The key is stored using the strongest available cryptographic service to bind it to the device. The device key, and all keys protected by the device key, cannot be moved, stolen or copied. Only devices equipped with appropriate identity keys can access specific applications such as financial systems, departmental systems and employee or customer data. PCs and other devices that cannot be identified as being owned or authorised by the organisation can be refused or restricted to low-risk areas.

Over the last year, Toyota and NTT Data have seen the benefits of device identification with Phoenix’s TrustConnector. In both instances, TrustConnector was deployed to prevent unauthorised access to the network, while allowing authorised PCs connecting from around the world to be authenticated. TrustConnector is an important complement to both companies’ existing security strategies and provides them with confidence in the security of their mobile devices.

Agile and Easy to Deploy

TrustConnector identifies devices when they connect through VPNs, wireless access points and all network connections or to any application that supports certificate-based authentication. The software works with a broad range of standard applications, including Internet Explorer, Outlook, wireless and VPN clients. In addition, the cost-effective solution creates a trusted network of the entire installed base of devices, including systems with and without Phoenix Core System Software, without requiring any new or additional hardware.

TrustConnector 2 leverages the Trusted Platform Module (TPM), when it is detected in the system, automatically utilising TPM’s cryptographic services and key storage. The software enhances the security of certificate-based Windows applications by storing private application keys, encrypted with device profile information, securely on the device. TrustConnector also ensures that devices are properly configured, patched and otherwise secured for appropriate levels of network access.

Enhanced IT controls in TrustConnector 2 allow IT managers to access configuration information locally and remotely. In the US TrustConnector 2 has been submitted for Federal Information Processing Standards (FIPS) 140-2 Level 1 certification to ensure that it meets national security guidelines.

Information on pricing and availability of Phoenix TrustConnector 2 software can be obtained through Phoenix or one of its global authorised distributors.

About Phoenix Technologies Ltd.

Phoenix Technologies (NASDAQ:PTEC) is a global market leader in device-defining software that assures endpoint security, from the start. The company first established dominant industry leadership 26 years ago with BIOS software, currently has more than one billion products deployed and continues to ship in over 100 million new systems each year. From this unique foundation of core system level expertise and firmware offering the highest levels of reliability, Phoenix has created a portfolio of innovative software products that simply and easily identify and restore devices, thereby ensuring unparalleled endpoint security and availability.

With a focused commitment to the highest levels of customer confidence and satisfaction, Phoenix serves enterprise and government channel partners, ODMs, OEMs, system builders and ISVs by enabling them to increase time to market, differentiate their products, create value, increase profits and decrease cost of ownership. Phoenix is headquartered in Milpitas California with offices worldwide in global business and technology centres. For more information, visit www.phoenix.com.

Don't miss