TPM and TNC Lead the Way as TCG Hosts a Record Number of Demonstrations during its RSA Association Session April 20, 2015

Date Published: April, 17, 2015

Perhaps TCG is a bit like the tortoise in the infamous fable involving a hare. But the sheer number and breadth of the TCG member demonstrations this year at the RSA Conference 2015 is a tangible result of years of R&D, product development, and continuing efforts by the trusted computing community, including academic institutions and commercial organizations, to create new software, standards and implementations of various TCG specifications.

What is striking about this year’s set of demonstration is that many of them are using the root of trust, enabled by the TPM, to do what the TPM does best: remote attestation, integrity checking, protection of keys and certificates and assurance of software and hardware– but not in a desktop PC, server or notebook. Instead, we are seeing a lot of examples of the TPM in non-traditional PC environments – from process control networks to automobiles as well as the expected IoT examples.

And, we are seeing many examples of companies working together to combine TCG standards, such as the TPM and TNC for network access and identity, into cohesive solutions that provide layered security.  Announced initially as the “MySpace” of networking (forget the dated reference), TCG’s IF-MAP, or metadata access protocol, has proven an excellent way to aggregate data from all kinds of security solutions and devices into a single place where it can be evaluated and decisions made about protecting networks – often automatically. And we are still seeing strong interest in BYOD management and security, along with better ways to protect data to and rom cloud applications and across heterogenous networks.

Check out our demo guide for more details or better yet, join us Monday, April 20, 9 a.m. – 1 p.m. in Moscone West, Rooms 2002/2006, for a terrific group of panels as well as more than 20 demos.



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More