Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Press Contact

Anne Price
PR Works Inc.

Phone: +1-602-330-6495

Industry News

2009, 2016

Securing networks in manufacturing

September 20th, 2016|0 Comments

For manufacturing companies, a common weak link in their enterprise network is the production network. To establish secure manufacturing, several enterprise aspects must be addressed, ideally by a risk management team with support from senior [...]

1409, 2016

31 Flavors of Trust

September 14th, 2016|0 Comments

When billions of things are connected together in the IoT how can the trustworthiness of each thing be verified?

2308, 2016

IoT Security to be Center Stage at Technology & Standards Forum

August 23rd, 2016|0 Comments

As we connect more and more of our lives to the internet, security becomes more and more important. We've all heard the stories of databases and devices being hacked. The question is, what are we doing about [...]

See More

Upcoming Events

  1. abstract-header_04

    27K: The Security Summit for the Americas

    September 26 - September 27
  2. abstract-header_08

    Connect Security World 2016

    September 26 - September 28
  3. abstract-header_01

    Structure Security 2016

    September 27 - September 28
  4. abstract-header_06

    Mobey Day 2016

    October 5 - October 6
  5. abstract-header_05

TCG News Releases

1209, 2016

Trusted Computing Group Webcast September 20 to Discuss How to Close Security Gaps in the Internet of Things

September 12th, 2016|0 Comments

PORTLAND, ORE., Sept. 12, 2016 -- Trusted Computing Group (TCG) and members GlobalSign and Cisco will discuss and demonstrate key techniques for closing critical IoT security gaps in a number of applications and endpoints in [...]

3108, 2016

Trusted Computing Group Brings Cybersecurity Seminar to Korea October 18 for IT, Security and Developer Professionals

August 31st, 2016|0 Comments

CONTACT: Anne Price, PR Works, Inc. +1-602-330-6495 Twitter: @TrustedComputin 담당자: 앤 프라이스(Anne Price), PR Works, Inc. +1-602-330-6495 Twitter: @TrustedComputin TRUSTED COMPUTING GROUP BRINGS CYBERSECURITY SEMINAR TO KOREA OCTOBER 18 FOR IT, SECURITY AND [...]

808, 2016

Trusted Computing Group Announces New Work Group to Address Security in Persistent Memory

August 8th, 2016|0 Comments

SANTA CLARA, Calif., August 8, 2016 – Trusted Computing Group has announced here at the Flash Memory Summit a new work group to develop industry standards and specifications for persistent memory to prevent data theft [...]

See More

Newsletter Signup

Please wait...
Stay current with Trusted Computing Group (TCG) activities, including recent case studies, press releases, industry news and upcoming events via the TCG Newsletter!

Whitepapers & Guides

306, 2016

Architects Guide: BYOD (Bring Your Own Device)

June 3rd, 2016|0 Comments

Companies and employees are increasingly exploring and embracing the concept of BYOD in the workplace. BYOD allows employees, partners, contractors, or guests to have an appropriate level of access to the enterprise network through their [...]

504, 2016

Data Security Using TCG Self-Encrypting Drive Technology

April 5th, 2016|0 Comments

This architect’s guide focuses on the deployment of available SED products in the enterprise (both laptops and the data center), highlighting best practices for implementation in a variety of case studies. Architects Guide Data Security [...]

1903, 2016

Industrial Control System (ICS) Security Using TNC Technology

March 19th, 2016|0 Comments

This webcast, based on TCG's Architect’s Guide, shows information technology and control systems executives and architects how to implement a standards-based, interoperable approach to ICS security as specified in ISA 99 (now IEC 62443) and [...]

See More

Member News Releases

109, 2016

ESCRYPT and GlobalSign to join Infineon Security Partner Network with smart factory solutions

September 1st, 2016|0 Comments

Munich, Germany – September 1, 2016 – With ESCRYPT Embedded Security and GlobalSign, the Infineon Security Partner Network (ISPN) welcomes new partners. Both companies offer dedicated security solutions for Industry 4.0 applications based on OPTIGA™ [...]

1304, 2016

WIBU-Systems at the SAE World Congress with its answer to IoT security

April 13th, 2016|0 Comments

Wibu-Systems joins the Trusted Computing Group to leverage Trusted Platform Modules as secure licensing elements Karlsruhe, Germany – April 12, 2016 -To further ramp up the versatility that characterizes its flagship technology, Wibu-Systems is joining [...]

2902, 2016

Infineon and Partners Demonstrate IoT Security at RSA Conference 2016

February 29th, 2016|0 Comments

Munich, Germany and San Francisco, USA – February 29, 2016 – Increasingly important for the success of IoT (Internet of Things) development are the ease-of-use in system design and implementation paired with the robust nature [...]

See More

Images & Graphics

109, 2014

Where Trust Begins

September 1st, 2014|0 Comments

View this infographic on protecting the connected ecosystem.

102, 2014

Protect Your Data and Enhance Security

February 1st, 2014|0 Comments

View this infographic on protecting your data and enhancing your security with TPM 2.0.

See More

Trusted Computing Membership thumbnail


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now
Trusted Computing thumbnail

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can secure cloud computing and virtualized systems.

Read More
Trusted Computing Specifications thumbnail


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission).

Read More