Phoenix Technologies Announces BIOS Replacement Product That Supports New Security Standards, Microsoft Windows Vista.
Phoenix Technologies Ltd. (Nasdaq:PTEC) today announced Phoenix TrustedCore(TM) SP2, the newest version of its innovative firmware that proactively protects X86-based computing devices and their data before the operating system and applications even load, creating a tamper-resistant platform.
TrustedCore SP2, which will begin shipping in October for desktop, mobile, embedded and server systems, incorporates sophisticated firmware security enhancements that fundamentally transform legacy BIOS technology. Phoenix's new BIOS core system software delivers a "root of trust," allowing customers to deploy devices that are inherently secure from the start and that support the latest in digital device authentication advancements. Phoenix will showcase the new technology in its booth -- Technology Showcase, Booth #741 -- at the Intel Developer Forum in San Francisco, August 23-25.
The Phoenix TrustedCore architecture enables makers and designers of PCs and other digital devices to create trusted and self-authenticating networked devices. The ability to easily certify a device as a trusted endpoint gives corporations and government organizations greater protection from attacks that enter a network through the endpoint device. In addition, the TrustedCore SP2 platform now includes the Phoenix CoreArchitect(TM) integrated development tool as a standard component, making it easier for device makers to speed new X86-based products to the marketplace in a highly cost-effective manner.
Industry Leadership at the Core of the Device
With this latest release of TrustedCore, Phoenix is taking a lead role for the industry in providing a platform for ensuring that PCs and embedded systems can meet current and emerging security standards and requirements. Phoenix is the first firmware maker to fully implement key industry standards required for Microsoft Windows Vista. This includes support for the Unified Extensible Firmware Interface (UEFI) specification through a UEFI boot loader capability, and support for the Trusted Platform Module (TPM) 1.2 specification compliance requirements of the Trusted Computing Group. TrustedCore SP2's support of the TPM 1.2 specification will help ensure that malicious code cannot invade a device so early in its boot process that steps cannot be taken to thwart the attack. The UEFI specification is part of an industry initiative to ensure a clean interface between a device's operating system and the platform firmware at the boot time.
Phoenix has also created a pre-boot authentication standard, based on a set of application programming interfaces, that will allow for easy integration of third-party two-factor authentication devices, such as biometric fingerprint sensors and smart tokens. This standard will assist device developers in creating endpoint devices that are highly tamper-resistant. As a result, customers will be able to more readily deploy PCs that require use of a password and a second factor, such as a fingerprint, to ensure authenticated booting of PCs.
Phoenix is also leading the industry with its ability to provide master boot record authentication at the firmware level, which will prevent tampering of the operating system or the hard disk. Targeted for specialized applications and embedded systems, master boot record authentication provides a trusted boot path for the whole operating system, and contributes to meeting Microsoft's Secure Startup requirements for tamper-resistant devices.
In addition, Phoenix TrustedCore includes an embedded cryptographic engine, called StrongROM, that allows authentication of the firmware itself. StrongROM can complement use of TPM 1.2 chip technology to further enhance device security or provide a level of cryptographic security by itself for systems that do not contain a TPM 1.2 compliant chip.
TrustedCore now comes standard with the Phoenix CoreArchitect integrated development environment. Based on the popular Microsoft Visual Studio.NET tool, CoreArchitect allows for drag and drop of selected features for fast deployment of TrustedCore-based designs. Developers familiar with the Microsoft technology can easily adapt their programming skills to the TrustedCore platform.
"As threats to networked devices become more sophisticated and more widespread, Phoenix Technologies has responded to these challenges with the latest release of TrustedCore, which provides the robust security foundation required by end users today," said Michael D. Goldgof, senior vice president and general manager of the Corporate Marketing and Product Divisions for Phoenix Technologies. "During this age of unprecedented connected computing devices and seamless global networks, customers will continue to rely on innovations from Phoenix to allow them to defeat both software- and hardware-based attacks."
During its more than 25 years of history, Phoenix has pioneered BIOS and other pre-OS technologies that cover all aspects of starting, managing, securing, maintaining and shutting down PCs and other networked digital devices, allowing end users to enable, protect and recover their important data, as well as X86-based PCs and digital devices. To date, more than one billion devices with Phoenix's BIOS technology have been shipped worldwide, with more than 100 million new devices shipped every year.
Information on pricing and availability of Phoenix TrustedCore SP2 core system software can be obtained through Phoenix or one of its global authorized distributors.
About Phoenix Technologies Ltd.
Phoenix Technologies Ltd. develops a complete product suite of Core System Software, tools and applications to deliver trusted, seamless computing to digital devices for an Internet-connected world. Phoenix Technologies helped launch the PC industry over 25 years ago. Today, the company is extending its leadership and knowledge at the core of machines, beyond the PC to a wide range of platforms and devices.
Phoenix Core System Software has set the standard for the world's leading branded PC OEMs and their global network of supply chain and software partners. Today, Phoenix solutions define, identify and restore the world's best-known systems. These solutions are built into the device core, where they are protected from viruses, user errors, hackers and corruption. Phoenix is headquartered in Milpitas, Calif. (Silicon Valley), with offices in global business and technology centers. For more information, visit www.phoenix.com
Phoenix, Phoenix Technologies, the Phoenix Technologies logo, CoreArchitect and TrustedCore are trademarks and/or registered trademarks of Phoenix Technologies Ltd. All other trademarks are the property of their respective owners.