|Resource Name||Resource Type|
|Trusted Network Connect: Standards for Network Security||Presentation|
|ESUKOM Demo: Automated Mobile Security||Video|
|Commonly Asked Questions and Answers - TNC/InformationWeek Webcast||Webcast|
|Automate to Win: The Business Case for Standards-based Security||Webcast|
|TNC IF-MAP Interoperability Demonstration||Video|
|TNC Interfaces Enable Dynamic Differentiation||Video|
|Juniper Networks Demonstrates Mobile User/Remote Access||Video|
|Lumeta Demonstrates Pervasive Security with TNC Data Center Management||Video|
|Byres Security Demonstrates Industrial Control System (SCADA)||Video|
|Extending Network Access Control||Webcast|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.