Where Trust Begins: A Look at TCG and Better Security

Date Published: October, 01, 2015

TCG has long stood for “trust” as a key part of security. What, exactly, does this mean and why is it important now more than ever?

First, let’s get back to basics. A trusted system:

  • Behaves predictably, even under stress
  • Is trusted by others based on evidence and/or experience
  • Is based on fundamental properties (identity, integrity)

Sounds good, right? How can we do that? It’s widely known now that software security is not enough. Software has been proven untrustworthy over and over again. A better solution is trust based on hardware. That’s what TCG’s Trusted Platform Module, or TPM, does. TPMs are embedded into computing devices – PCs, servers, networking gear, ATMs, kiosks, mobile phones, tablets and more – and provide a tamper-proof secure method for authentication, encryption and attestation.

Recent news reports of breaches tell us that often, security’s weakest link is us humans. That’s why trust is not simple. It depends on security practitioners and IT teams to use available tools and solutions to leverage trust. These include:

  • Windows 8
  • Windows Server
  • Enterprise PCs and servers with TPMs
  • Encrypting hard drives and SSDs and enterprise-class storage devices widely available for little to no cost differential
  • Networking gear, including wireless routers and hubs, support TNC to ensure secure connections and protect network health

Learn more about today’s untrusted environment and how trust helps security in our new infographic, available here.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More