Trusted Computing Group

Trusted Computing Group company information, Employees & Contact Information

The Trusted Computing Group (TCG) is a global organization that develops open security standards and specifications based on root of trust enabling secure interoperable systems and networks across industries. The TCG category of secure computing has created billions of secure endpoints across industries and technologies. The Root of Trust is the foundation TCG specifications are based upon with proven concepts to ensure the integrity of systems, protection of data and security for networks. Through Open, end-to-end standards, TCG and its global membership of the leading PC and server, semiconductor, software, networking, services and mobile device makers create specifications and international standards free to developers, manufacturers and users. Trusted Computing is a category of computing with a fundamentally secure approach based on a root of trust.” 54 new endpoints every second.

Company Details

Employees
29
Founded
-
Address
3855 Sw 153rd Dr, Beaverton,or 97003,united States
Phone
(503) 619-0562
Email
ad****@****oup.org
Industry
Information Technology & Services
HQ
Beaverton, OR
Looking for a particular Trusted Computing Group employee's phone or email?

Trusted Computing Group Questions

News

TCG computing DICE specification secures sensitive information, boosts performance - eeNews Europe

TCG computing DICE specification secures sensitive information, boosts performance eeNews Europe

Decentralized Trusted Computing Base for Blockchain Infrastructure Security - Frontiers

Decentralized Trusted Computing Base for Blockchain Infrastructure Security Frontiers

TCG Releases iTPM 2.0 Library Specification Revision 1.59 - Embedded Computing Design

TCG Releases iTPM 2.0 Library Specification Revision 1.59 Embedded Computing Design

Data storage making the transition to network-based systems - Military Aerospace

Data storage making the transition to network-based systems Military Aerospace

Controlling the endpoint - SC Media

Controlling the endpoint SC Media

Sensing the danger - New Electronics

Sensing the danger New Electronics

The importance of cybersecurity: Protecting against cyber-attacks - Open Access Government

The importance of cybersecurity: Protecting against cyber-attacks Open Access Government

Raising the bar for security needs: What does "secure boot" really mean? - Military Embedded Systems

Raising the bar for security needs: What does "secure boot" really mean? Military Embedded Systems

Infineon First to Release Windows Vista Ready TPM v1.2 Management Suite for Simple Manageability of Trusted Platforms in Enterprise Environments - presseagentur.com

Infineon First to Release Windows Vista Ready TPM v1.2 Management Suite for Simple Manageability of Trusted Platforms in Enterprise Environments presseagentur.com

Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing - Frontiers

Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing Frontiers

Securing a factory's OT network and the role of trust - Embedded Computing Design

Securing a factory's OT network and the role of trust Embedded Computing Design

The keys to secure embedded software development - New Electronics

The keys to secure embedded software development New Electronics

World’s First TPM 2.0 with Open-Source Software Stack Cuts Down Security Integration Efforts in Industrial, Automotive and IoT Applications - Embedded Computing Design

World’s First TPM 2.0 with Open-Source Software Stack Cuts Down Security Integration Efforts in Industrial, Automotive and IoT Applications Embedded Computing Design

Using a trusted platform module and trusted brokered IO as the foundation of IoT security - Embedded Computing Design

Using a trusted platform module and trusted brokered IO as the foundation of IoT security Embedded Computing Design

Securing Industrial IoT Sensors, Part 2: Trusted Software Stack - Embedded Computing Design

Securing Industrial IoT Sensors, Part 2: Trusted Software Stack Embedded Computing Design

Top Trusted Computing Group Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant