Site Puts Trusted Computing How-to Guides, Software and Hardware, Tools and More in Single Place to Help Developers Streamline Security Development
PORTLAND, Ore., May 23, 2018 – Trusted Computing Group has created a new website to provide developers with tools and resources to build trust into systems and devices, including embedded and IoT, for better security.
The site was developed with assistance from Embedded Computing Design and will be available as a link from the TCG site, from the Embedded Computing Design site, and as a stand-alone destination. No registration is required. Within the site, users can search and locate open source and commercial trusted software stacks, developer tools, how-to guidance and other resources supporting the use of trusted computing. Users can also subscribe to news and access webcasts and other useful resources.
Trusted computing, supported by industry standards and specifications created by TCG, enables security of data and enterprise, IoT and embedded systems; secure authentication and strong protection of user identities; and strong machine identity and network integrity. TCG has extended its widely vetted and adopted trusted computing concepts and standards into embedded and IoT devices and has published a number of guidance, architecture and specification documents about the root of trust and how it can be used to protect data, devices and networks.
TCG members will address embedded and IoT security at a workshop at Sensors Expo on Thursday, June 28th, 2018 from 1:00- 4:30 p.m. Pacific Daylight Time at the San Jose Convention Center. Members will demonstrate the DICE lightweight root of trust, the TPM for network security and the Trusted Software Stack in Booth #1539 on the expo floor during expo hours.
TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry specifications and standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information is available at www.trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.
Brands and trademarks are the property of their respective owners.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.