Using the TPM to Solve’s Today’s Most Urgent Cybersecurity Problems

Date Published: April, 01, 2014

We recently noted in our Twitter feed that NIST has added a section to its website focused on the hardware root of trust.

The RoT is becoming more widely recognized and advocated as a key security concept in light of many recent attacks, increasingly complex malware and the growing tangle of connected devices, or Internet of Things, that offer convenience but opens up gaping security holes for enterprises and users.

We recently wrote about how one company, Aerohive, is using the TPM to securely store keys and certificates for wireless access points. Many other vendors are using the TPM for similar tasks and for others, like authentication.

How can you, as an enterprise user or developer, utilize the TPM? On Tues., May 20, 1:00 p.m. East/10 a.m. Pacific, TCG will host an educational webinar on the TPM.

This webinar will address a fundamental and key aspect to IT security: the root of trust. Embedded into devices, the root of trust, typically implemented by the TPM, provides a proven, safe foundation for more secure computing.

Learn the key concepts of trusted systems, why they’re critical to establishing security and supporting other solutions and what is new with the TPM.

Intel’s Monty Wiseman and Cisco’s Stacy Cannady will review key TPM capabilities and its use.

Join us by registering here with BrightTalk:



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More