IBM Adds Roaming Capability to Embedded Security Subsystem, Making PC Security Stronger and More Flexible at the Same Time

Select a topic or year

SAN FRANCISCO, CA - 15 Apr 2003: IBM today announced new features for the Embedded Security Subsystem included on select IBM ThinkPad notebooks and desktop PCs that provide more flexibility for users. These features include the ability to roam securely and to use smart cards for authentication. Additionally, IBM announced an alliance with Check Point Software Technologies, an important step toward enhancing end-to-end network security in increasingly wireless environments.

IBM's Embedded Security Subsystem, an IBM ThinkVantage Technology, consists of an integrated security chip and IBM Client Security Software. Working together, these components help protect vital security information, such as passwords, encryption keys and electronic credentials. In 1999, IBM became the first company to offer a PC with embedded security. With four years of security experience and leadership, IBM now offers the security system on select models throughout its notebook and desktop line. And when this system is combined with the security provided by IBM wireless technology, select models ThinkPad notebooks provide the most secure wireless solutions in the industry.

Today, IBM announces the latest version of its Client Security Software. IBM Client Security Software Version 5.1 (CSS 5.1) now includes a roaming feature that enables users' security credentials, including cryptographic keys and certificates, to be sent to another system from an enabled server. This feature is useful in environments where workers share PC workstations or move system to system, such as in health care, education, and government organizations.

In addition, IBM announced that the recently introduced GemPlus GemPC400 compact smart card reader/writer, from IBM, is compatible with the IBM Embedded Security Subsystem with CSS 5.1. This compatibility gives end-users the option of using smart cards for system authentication, as well as network and VPN access. Now users can use their smart card to access their system, the network or secure files, depending on the security policies they preset on their systems.

Smart cards may be used in conjunction with fingerprint readers and pass phrases already supported by IBM's Embedded Security Subsystem.

"Strengthening security while supporting the flexibility required for numerous work environments sounds like an impossible task, but that's what the new version of our client security software is designed to do," says Bob Galush, vice president of marketing, IBM Personal Computing Division. "IBM is also leader in the creation of new security standards such as the TCG 1.1 specifications and is ensuring that our solutions remain compliant. And at the same time we're working with other companies to extend the breadth of our security solutions."

Check Point, a worldwide market leader of Virtual Private Network (VPN) and firewall technologies, offers an enhanced version of Check Point VPN-1 SecureClient software that is compatible with IBM's Embedded Security Subsystem. Check Point's solution delivers centrally managed personal firewall protection, auto-launch capabilities and VPN connectivity in wired and wireless environments. The Embedded Security Subsystem features a hardware security module integrated into the PC that can be used to store the VPN-1 SecureClient authentication certificate. VPN-1 SecureClient can also rely on the Embedded Security Subsystem to govern access to the certificate based on customer-written policy. This policy may require a pass phrase, fingerprint, smart card or all of the above, in order to start a VPN-1 session. Combining Check Point's solution with the IBM Embedded Security Subsystem helps enterprises achieve a more secure wired or wireless computing experience, and can help maintain the integrity of the corporate network.

IBM's Client Security Software Version 5.1 will be available for download on the IBM website in May for customers with the Embedded Security Subsystem.

Related XML feeds
Topics XML feeds
Information Management, Lotus, Tivoli, Rational, WebSphere, Open standards, open source