Q&A on ESUKOM with Jens Lucius, QA Manager and Trainer at NCP engineering, Part 3
Today, we round out our conversation with Jens Lucius, QA manager and trainer at NCP engineering on the ESUKOM project, an initiative that aims to develop a real-time security solution for enterprise networks based upon the correlation of metadata. As a core member of the project, NCP has compiled a technical paper on the project, as well.
Q: NCP is also involved in the <a href="http://www.trustedcomputing.eu/cms/projects/">VOGUE project</a>, which aims to develop an integrated security platform allowing mobile devices to access different IT systems securely. Can you provide any updates on
Jens: The VOGUE project has already reached its official end date but the results are still very exciting for current development in the market. The goal of VOGUE was to create a mobile system (in this case, an Android phone) with a reliable system config
A serious problem introduced by smartphones connecting to company infrastructure is, an administrator does not know what components are running on that system and if the system is still in good health. VOGUE uses another TCG technology (the TPM) to “measure” the system state, transfer that to an enforcement system (via TNC protocol) and only allow VPN access if that state is correct. While in ESUKOM, we try the secure the network on the central side, VOGUE aims at securing the mobile endpoint.
At the time of the VOUGUE project there was no mobile phone with an integrated TPM, but now Windows 8 tablets are soon to be released including a TPM to secure the mobile platform so the results are still valid for upcoming technology. A demonstrator for the project result is hosted by the Fraunhofer SIT, a leading research institute for IT Security in Germany, which you can see here: http://www.trustedcomputing.eu/cms/prototypes-demonstrators/.