Member Testimonial

"Our membership in TCG not only offers us the opportunity to share solutions for today's security problems, it also gives us the opportunity to understand the demands of the market, including vendors and users. This knowledge has proven very useful in developing products. Furthermore, our product development activities are executed in the context of a motivated, expert peer-reviewed standards development process.  Overall, our visibility in the market has benefited from TCG's many marketing programs."

- David Mattes, Asguard Networks

Learn More

Quick Links

Resources333 Results

icon

Where Trust Begins

View this infographic on protecting the connected ecosystem. ...

September 2014 | White Papers | Add to Briefcase

icon

TNC IF-MAP Metadata for ICS Security

The purpose of this specification is to facilitate the deployment, management, and protection of large-scale industrial control......

September 2014 | Specifications | Add to Briefcase

icon

TNC IF-MAP Metadata for ICS Security 1.0 FAQs

FAQs for TNC IF-MAP Metadata for ICS Security, Version 1.0, Revision 45...

September 2014 | White Papers | Add to Briefcase

icon

PC Client Platform TPM Profile (PTP) Specification

The following TCG PC Client Work Group specification has been posted for public review. ...

August 2014 | Specifications | Add to Briefcase

icon

Server ACPI Specification

This specification defines the framework of necessary ACPI tables and basic methods to be used on a TCG compliant platform. The......

June 2014 | Specifications | Add to Briefcase

icon

TCG EK Credential Profile for TPM Family 2.0

The purpose of this document is to define the TPM 2.0 Endorsement Key (EK) Credential. This specification describes the content of......

June 2014 | Specifications | Add to Briefcase

icon

TCG TPM 2.0 Library Profile for Automotive-Thin

The following TCG Embedded Systems Work Group specification has been posted for public review. ...

June 2014 | Specifications | Add to Briefcase

icon

TNC MAP Content Authorization

This Trusted Network Connect Working Group (TNC) specification provides a standard model for controlling what operations MAP......

June 2014 | Specifications | Add to Briefcase

icon

TCG Educational Webcasts

View the TCG hosted BrightTalk webcast channel. ...

May 2014 | Podcasts/Webcasts | Add to Briefcase

icon

Root of Trust: Foundation for IT Security

A tsunami of news reports about data breaches, attacks and hacks has left the security and IT communities reeling – and busy. And......

May 2014 | White Papers | Add to Briefcase

icon

TSS System Level API and TPM Command Transmission Interface Specification

The scope of this document is to describe all the software interfaces to the TSS system API (SAPI) and TPM Command Transmission......

May 2014 | Specifications | Add to Briefcase

icon

PC Client Protection Profile for TPM 2.0

This protection profile describes the security requirements for the Trusted Computing Group (TCG) PC Client Specific Trusted......

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-M: TLV Binding Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to......

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification

Trusted Network Connect (TNC) is a working group within the Trusted Computing Group (TCG). TNC is defining an open solution......

May 2014 | Specifications | Add to Briefcase