Member Testimonial

"Our membership in TCG not only offers us the opportunity to share solutions for today's security problems, it also gives us the opportunity to understand the demands of the market, including vendors and users. This knowledge has proven very useful in developing products. Furthermore, our product development activities are executed in the context of a motivated, expert peer-reviewed standards development process.  Overall, our visibility in the market has benefited from TCG's many marketing programs."

- David Mattes, Asguard Networks

Learn More

Quick Links

Resources332 Results

icon

PC Client Platform TPM Profile (PTP) Specification

The following TCG PC Client Work Group specification has been posted for public review. ...

August 2014 | Specifications | Add to Briefcase

icon

Server ACPI Specification

This specification defines the framework of necessary ACPI tables and basic methods to be used on a TCG compliant platform. The......

June 2014 | Specifications | Add to Briefcase

icon

TCG EK Credential Profile for TPM Family 2.0

The purpose of this document is to define the TPM 2.0 Endorsement Key (EK) Credential. This specification describes the content of......

June 2014 | Specifications | Add to Briefcase

icon

TCG TPM 2.0 Library Profile for Automotive-Thin

The following TCG Embedded Systems Work Group specification has been posted for public review. ...

June 2014 | Specifications | Add to Briefcase

icon

TNC MAP Content Authorization

This Trusted Network Connect Working Group (TNC) specification provides a standard model for controlling what operations MAP......

June 2014 | Specifications | Add to Briefcase

icon

TCG Educational Webcasts

View the TCG hosted BrightTalk webcast channel. ...

May 2014 | Podcasts/Webcasts | Add to Briefcase

icon

Root of Trust: Foundation for IT Security

A tsunami of news reports about data breaches, attacks and hacks has left the security and IT communities reeling – and busy. And......

May 2014 | White Papers | Add to Briefcase

icon

TSS System Level API and TPM Command Transmission Interface Specification

The scope of this document is to describe all the software interfaces to the TSS system API (SAPI) and TPM Command Transmission......

May 2014 | Specifications | Add to Briefcase

icon

PC Client Protection Profile for TPM 2.0

This protection profile describes the security requirements for the Trusted Computing Group (TCG) PC Client Specific Trusted......

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-M: TLV Binding Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to......

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-T: Protocol Bindings for Tunneled EAP Methods Specification

Trusted Network Connect (TNC) is a working group within the Trusted Computing Group (TCG). TNC is defining an open solution......

May 2014 | Specifications | Add to Briefcase

icon

TNC IF-TNCCS Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to......

May 2014 | Specifications | Add to Briefcase

icon

FAQ: Enterprise SSC Locking LBA Ranges Control Feature Set v1.00

This document addresses FAQ's for the TCG Storage Enterprise SSC Locking LBA Ranges Control Feature Set specification, version......

May 2014 | Presentations | Add to Briefcase

icon

TCG Storage Enterprise SSC Feature Set Locking LBA Ranges Control Specification

This document introduces a new Feature Set with the intention to provide better control over LBA ranges locking state. The TCG......

May 2014 | Specifications | Add to Briefcase

icon

Registry

This page includes all registries published by TCG. ...

April 2014 | Specifications | Add to Briefcase