Member Testimonial

"Our membership in TCG not only offers us the opportunity to share solutions for today's security problems, it also gives us the opportunity to understand the demands of the market, including vendors and users. This knowledge has proven very useful in developing products. Furthermore, our product development activities are executed in the context of a motivated, expert peer-reviewed standards development process.  Overall, our visibility in the market has benefited from TCG's many marketing programs."

- David Mattes, Tempered Networks

Learn More

Quick Links

Resources336 Results

icon

Server ACPI Specification

The Trusted Computing Group (TCG) has announced the availability of a new version of the TCG ACPI Specification. ...

December 2014 | Specifications | Add to Briefcase

icon

TPM 2.0 Mobile Command Response Buffer Interface Specification

The Trusted Computing Group has published two Trusted Platform Module (TPM) 2.0 Mobile Specifications: ...

December 2014 | Specifications | Add to Briefcase

icon

TPM 2.0 Mobile Reference Architecture Specification

The Trusted Computing Group has published two Trusted Platform Module (TPM) 2.0 Mobile Specifications: ...

December 2014 | Specifications | Add to Briefcase

icon

TNC Endpoint Compliance Profile Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open architecture for network security, including standard......

December 2014 | Specifications | Add to Briefcase

icon

TNC IF-IMV Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to......

December 2014 | Specifications | Add to Briefcase

icon

TPM Keys for Platform Identity for TPM 1.2

The following TCG Infrastructure Work Group specification has been posted for public review. ...

December 2014 | Specifications | Add to Briefcase

icon

TSS Feature API Specification

The TSS 2.0 Feature API is meant to be a very high level API, aimed at having commands in it that will allow 80% of the......

November 2014 | Specifications | Add to Briefcase

icon

TCG EK Credential Profile for TPM Family 2.0

The purpose of this document is to define the TPM 2.0 Endorsement Key (EK) Credential. This specification describes the content of......

November 2014 | Specifications | Add to Briefcase

icon

TPM Library Specification

TCG has released the TPM 2.0 library specification that provides updates to the previous published TPM main specifications. ...

October 2014 | Specifications | Add to Briefcase

icon

TCG TPM 2.0 Library Profile for Automotive-Thin

The following TCG Embedded Systems Work Group specification has been posted for public review. ...

October 2014 | Specifications | Add to Briefcase

icon

Where Trust Begins

View this infographic on protecting the connected ecosystem. ...

September 2014 | White Papers | Add to Briefcase

icon

TNC IF-MAP Metadata for ICS Security

The purpose of this specification is to facilitate the deployment, management, and protection of large-scale industrial control......

September 2014 | Specifications | Add to Briefcase

icon

TNC IF-MAP Metadata for ICS Security 1.0 FAQs

FAQs for TNC IF-MAP Metadata for ICS Security, Version 1.0, Revision 45...

September 2014 | White Papers | Add to Briefcase