Phoenix TrustedCore Pre-empts and Defeats Below-the-OS Cyber Attacks

11/9/2004 - Phoenix Technologies Ltd. (Nasdaq:PTEC) announced continued support for the National Cyber Security Alliance (NCSA) and its role in securing personal computers and protecting the Internet infrastructure. In support of this initiative, Phoenix has made available a new white paper titled, "The Newest, Most Dangerous Virus Threat -- and What You Can Do To Prevent It."

The National Cyber Security Alliance is focused on promoting cyber security, driving awareness and response to pressing cyber security issues. Working in collaboration with government and industry partners such as the Department of Homeland Security (DHS), NCSA launched National Cyber Security Awareness Month to raise awareness so that users improve their cyber security preparedness.

Through its support of the recent National Security Awareness month, and in response to the recent national elections and the call for increased government, business and end user cyber security, Phoenix developed the "Dangerous Virus Threat" white paper. The white paper is designed to give computer and connected device developers, integrators, enterprises, government agencies and end users background information on the threat and history of Flash attacks. The white paper provides valuable information and a solution on how organizations can increase their cyber security preparedness and build-in the necessary security in future PCs and connected digital devices.

Cyber Threat: Attacking a Digital Device's Flash
As evident in the discussions during the recent Presidential election, it is clear that cyber-terrorism continues to be a serious global threat, and Phoenix Technologies is at the forefront of the effort to protect PCs, connected digital devices, and digital assets from cyber attack.

Professional hackers are quickly realizing a new potential target for their efforts -- the device Flash where the core system software resides. Flash memory is a PC or connected digital device's most vulnerable point for attack. In a Flash attack, the PC or device can be rendered useless. Or, even worse, the Flash hacker can track every keystroke, or record all user account numbers.

"When a system is down or won't run due to a worm, virus or hacker attack, valuable time and data are lost, and it can be a long, expensive process to recover it. We're not just talking about broken PCs here, but broken companies and economies," said Michael D. Goldgof, Senior Vice President and General Manager of the Phoenix Technologies Corporate Marketing and Products Division. "Our ability to deliver trust at the core of all connected devices and to protect the device, and a user, enterprise or government's critical data, is a crucial step in addressing the threat of cyber-terrorism."

The Phoenix three-pronged security approach -- enable, protect and recover -- ensures PCs and connected digital devices provide a "chain of trust" for the world's computing and networking needs. Phoenix Technologies is also a key member of the Trusted Computing Group (TCG), a coalition of computing and device manufacturers, software vendors and others who are working together to provide industry standards for trusted computing.

Phoenix builds security into all of its products to proactively secure the PC or connected digital device. To help pre-empt cyber attacks and to protect PCs and digitally connected devices, Phoenix developed the TrustedCore suite of products for the manufacturer, OEM and system builder, spanning computer firmware, development tools and applications designed for the future. TrustedCore provides a security architecture platform that can be easily customized to meet the configuration requirements of various target markets.

To extend the security features within TrustedCore, Phoenix introduced Core Managed Environment (cME™) TrustConnector. TrustConnector is trusted computing software that enables seamless, built-in x86 device authentication to IP networks, and protects identity credentials for Windows applications. With TrustConnector, private keys and other digital credentials can be securely stored in the hardware of the device enabling device authentication.

As part of their support for National Cyber Security Month, Phoenix produced and is now making "The Newest, Most Dangerous Virus Threat -- and What You Can Do To Prevent It" white paper available online at For additional information on the NCSA visit

About Phoenix Technologies
Phoenix Technologies develops a complete product suite of Core System Software, tools and applications to deliver trusted, seamless computing to digital devices for an Internet-connected world. Phoenix Technologies helped launch the PC industry nearly 25 years ago. Today the company is extending its leadership and knowledge at the core of machines, beyond the PC to a wide range of platforms and devices.

Phoenix Core System Software has set the standard for the world's leading branded PC OEMs and their global network of supply chain and software partners. Today, Phoenix solutions enable, secure, connect, and recover the world's best-known systems. These solutions are built into the device core, where they are protected from viruses, user errors, hackers, and corruption. Phoenix is headquartered in Milpitas, Calif. (Silicon Valley), with offices in global business and technology centers. For more information, visit

Phoenix, Phoenix Technologies and the Phoenix Technologies logo, CoreArchitect, cME and TrustedCore are trademarks and/or registered trademarks of Phoenix Technologies Ltd.

Previous Page | News by Category | News Search

If you found this page useful, bookmark and share it on: