Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Press Contact

Anne Price
PR Works Inc.

Phone: +1-602-330-6495
Email: press@trustedcomputinggroup.org

Industry News

2308, 2016

IoT Security to be Center Stage at Technology & Standards Forum

August 23rd, 2016|0 Comments

As we connect more and more of our lives to the internet, security becomes more and more important. We've all heard the stories of databases and devices being hacked. The question is, what are we doing about [...]

1708, 2016

Protecting the IoT with self-encrypting storage, part 2

August 17th, 2016|0 Comments

As noted in part one of this blog, self-encrypting storage (SES) will increasingly be required to protect embedded products, especially as the Internet of Things (IoT) expands. This encryption is already available in SED products. However, [...]

1708, 2016

Protecting the IoT with self-encrypting storage, part 1

August 17th, 2016|0 Comments

Problems associated with the loss of data, data breaches, brand damage/impact, and compliance issues are well known to desktop and portable computer users. To avoid the unauthorized access of the data on these types of [...]

See More

Upcoming Events

  1. abstract-header_13

    Peggy Smedley Institute

    September 9 @ 9:00 AM - 5:00 PM UTC-7
  2. abstract-header_11

    “Securing IoT Endpoints, Networks and the Cloud” Webcast

    September 20 @ 9:00 AM - 10:00 AM UTC-7
  3. Abstract Header
  4. abstract-header_08

    Connect Security World 2016

    September 26 - September 28
  5. abstract-header_04

    27K: The Security Summit for the Americas

    September 27 - September 28

TCG News Releases

808, 2016

Trusted Computing Group Announces New Work Group to Address Security in Persistent Memory

August 8th, 2016|0 Comments

SANTA CLARA, Calif., August 8, 2016 – Trusted Computing Group has announced here at the Flash Memory Summit a new work group to develop industry standards and specifications for persistent memory to prevent data theft [...]

108, 2016

Mobile Devices and Encryption Focus of Trusted Computing Group Sessions and Demos at Flash Memory Summit

August 1st, 2016|0 Comments

What:              Trusted Computing Group (TCG) and members from Drive Trust Alliance, Micron and ULink will demonstrate self-encrypting storage and its use in enterprise, client and Internet of Things applications at the Aug. 9-11 Flash [...]

507, 2016

Trusted Computing Group to Show Securing the Internet of Things at July 11-14 IoT Evolution Expo

July 5th, 2016|0 Comments

TCG and Cisco Systems Expert to Address Remote Monitoring and Management and IoT Standards in Panel Sessions  PORTLAND, Ore., July 5, 2016 – Trusted Computing Group and members will speak on securing the Internet of [...]

See More

Newsletter Signup

Please wait...
Stay current with Trusted Computing Group (TCG) activities, including recent case studies, press releases, industry news and upcoming events via the TCG Newsletter!

Whitepapers & Guides

306, 2016

Architects Guide: BYOD (Bring Your Own Device)

June 3rd, 2016|0 Comments

Companies and employees are increasingly exploring and embracing the concept of BYOD in the workplace. BYOD allows employees, partners, contractors, or guests to have an appropriate level of access to the enterprise network through their [...]

504, 2016

Data Security Using TCG Self-Encrypting Drive Technology

April 5th, 2016|0 Comments

This architect’s guide focuses on the deployment of available SED products in the enterprise (both laptops and the data center), highlighting best practices for implementation in a variety of case studies. Architects Guide Data Security [...]

1903, 2016

Industrial Control System (ICS) Security Using TNC Technology

March 19th, 2016|0 Comments

This webcast, based on TCG's Architect’s Guide, shows information technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security as specified in ISA 99 (now IEC 62443) and [...]

See More

Member News Releases

1304, 2016

WIBU-Systems at the SAE World Congress with its answer to IoT security

April 13th, 2016|0 Comments

Wibu-Systems joins the Trusted Computing Group to leverage Trusted Platform Modules as secure licensing elements Karlsruhe, Germany – April 12, 2016 -To further ramp up the versatility that characterizes its flagship technology, Wibu-Systems is joining [...]

2902, 2016

Infineon and Partners Demonstrate IoT Security at RSA Conference 2016

February 29th, 2016|0 Comments

Munich, Germany and San Francisco, USA – February 29, 2016 – Increasingly important for the success of IoT (Internet of Things) development are the ease-of-use in system design and implementation paired with the robust nature [...]

1401, 2016

Infineon OPTIGA™ TPM chips protect latest Microsoft Surface devices

January 14th, 2016|0 Comments

Microsoft puts emphasis on hardware based security to protect sensitive user data stored on connected devices. The company integrates OPTIGA™ TPMs (Trusted Platform Modules) from Infineon Technologies AG (FSE: IFX / OTCQX: IFNNY) into its [...]

See More

Images & Graphics

109, 2014

Where Trust Begins

September 1st, 2014|0 Comments

View this infographic on protecting the connected ecosystem.

102, 2014

Protect Your Data and Enhance Security

February 1st, 2014|0 Comments

View this infographic on protecting your data and enhancing your security with TPM 2.0.

See More

Trusted Computing Membership thumbnail

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now
Trusted Computing thumbnail

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can secure cloud computing and virtualized systems.

Read More
Trusted Computing Specifications thumbnail

Specification

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission).

Read More