TCG has long stood for “trust” as a key part of security. What, exactly, does this mean and why is it important now more than ever?
First, let’s get back to basics. A trusted system:
Sounds good, right? How can we do that? It’s widely known now that software security is not enough. Software has been proven untrustworthy over and over again. A better solution is trust based on hardware. That’s what TCG’s Trusted Platform Module, or TPM, does. TPMs are embedded into computing devices – PCs, servers, networking gear, ATMs, kiosks, mobile phones, tablets and more – and provide a tamper-proof secure method for authentication, encryption and attestation.
Recent news reports of breaches tell us that often, security’s weakest link is us humans. That’s why trust is not simple. It depends on security practitioners and IT teams to use available tools and solutions to leverage trust. These include:
Learn more about today’s untrusted environment and how trust helps security in our new infographic, available here.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.