Tell Us About Your Internet of Things (IoT) and Embedded Systems Security Fears, Plans and Ideas

Date Published: January, 30, 2017

Trusted Computing Group (TCG) has teamed with Embedded Computing Design to find out more about how developers and designers, as well as providers of various elements of these systems, are thinking about security.

We all know that traditional embedded systems often have long life cycles; must meet a wide variety of demanding cost, power, space and other constraints; and typically were not connected to the Internet. The explosion of connected systems and new IoT devices has changed the equation for security.

We are hoping that if you are working in this space or plan to do so, you will share your thoughts about the role of security, how it might be implemented and what your security priorities are.

The survey was developed with ECD and takes about 10 minutes to take. Survey takers can enter to win one of three Raspberry Pi 3 kits with Infineon OPTIGA™ TPM daughtercard and Mocana security modules. Thanks to our TCG members Infineon and Mocana for the donations.

Take the survey here:


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More