Press Room

Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance.

Industry News

Flash Memory Summit: Toshiba Unveils Enterprise 2.5-Inch PM5 12Gb SAS and CM5 NVMe SSDs With 64 Layer TLC BiCS Flash

Toshiba Memory Corporation (TMC) sampling fastest [2] SAS and enterprise NVMe TLC-based SSDs.Toshiba Electronics Europe GmbH announced the development of two enterprise SSD solutions, the PM5 12Gb/s SAS series and the CM5 NVMe [3]  series. [...]

Establishing a root of trust: Trusted computing and Intel-based systems

STEVE EDWARDS, CURTISS-WRIGHT DEFENSE SOLUTIONS -  In the global defense-electronics market there is a growing demand for trusted computing solutions that carry effective protections against cyberattacks. Users want to be confident that when they power up their deployed embedded system [...]

Majority of Consumers Believe IoT Needs Security Built In

Dark Reading: Respondents to a global survey say Internet of Things security is a shared responsibility between consumers and manufacturers. [...]

See More

TCG News Releases

Data Protection and Security, From Enterprise To Autos, Focus of TCG at Flash Memory Summit

Demos and Presentations to Address Securing Data Everywhere PORTLAND, Ore., July 31, 2017 – Trusted Computing Group (@TrustedComputin) and members will discuss and demonstrate how industry-standard self-encrypting drives (#SED) protect data at the Flash Memory Summit (#flashmem), Aug. 8-10, San [...]

TCG will Demonstrate How to Secure the IoT at Next Weeks IoT Evolution Expo

Panel Sessions to Address Role of Trust in Security and Securing Industrial Networks PORTLAND, Ore., July 12, 2017 – Trusted Computing Group members will address the leading barrier to IoT success*, security, at next week’s IoT Evolution Expo, Las Vegas in panel sessions and demonstrations. [...]

How to Secure Insecure Network Equipment

New Work from TCG to Be Presented at IoT Evolution Expo and July 25 Webcast     PORTLAND, ORE. June 28, 2017 – Today’s enterprises and Internet of Things rely on complex connected networks – networks that often are highly insecure.  Trusted Computing Group (TCG) has published new guid [...]

See More

Whitepapers & Guides

TCG Storage, Opal, and NVMe

The Trusted Computing Group (TCG) and NVM Express have collaborated on a whitepaper. The Opal “Family” of specifications published by the TCG provides a scalable infrastructure for managing encryption of user data in a Storage Device, as well as extensibility to enable features beyond “data at [...]

TCG ICS Specification for Network Segmentation

Download PDF (0.31 MB) [...]

Fear and Loathing in BYOD

A SANS Analyst Survey sponsored by the Trusted Computing Group. It’s not shocking to see media reports depicting the growth and continued adoption of mobile devices in enterprise networks. Smartphones and tablets enable improved personal productivity, on-demand data access and applications previou [...]

See More

Member News Releases

Micron and Microsoft Announce Collaboration to Help Improve Internet of Things Security

HANNOVER, Germany, April 24, 2017 (GLOBE NEWSWIRE) -- Micron Technology (Nasdaq:MU) and Microsoft today announced a collaboration that aims to address the major challenge of providing trusted computing models for IoT deployments in industrial, automotive and consumer environments. As digitization an [...]

Azure IoT supports new security hardware to strengthen IoT security

Microsoft’s commitment to leadership in IoT security continues with Azure IoT’s improving the level of trust and confidence in securing IoT deployments.  Azure IoT now supports Device Identity Composition Engine (DICE) and many different kinds of Hardware Security Modules (HSMs). DICE is an [...]

CES 2017: Infineon secures systems from wearables to automotive

As it has been for much of the last year, security was well addressed at CES 2017 in everything from consumer wearables to sophisticated automotive designs. Early in the show I got to see both ends of the security spectrum when visiting the Infineon booth, where Josef Kohn, Marketing and Program Man [...]

See More

Images & Graphics

Where Trust Begins

View this infographic on protecting the connected ecosystem. [...]

Protect Your Data and Enhance Security

View this infographic on protecting your data and enhancing your security with TPM 2.0. [...]

See More
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.