Search Resources

Clear Search


   

Storage Work Group Storage Interface Interactions Summary

Trusted Computing Group Storage Interface Interactions Specification Summary January 2009 The Storage Work Group of the Trusted Computing Group has several specifications. These are written in an interface-agnostic manner for trusted peripherals containing any storage medium. The Storage Interface Interactions specification provides the ‘glue' between these high-level specifications and th... READ MORE

Storage Work Group Storage Security Subsystem Class: Enterprise Summary

Trusted Computing Group Storage Work Group Summary Enterprise Security Subsystem Class Specification January 2009 Based on the growing number of security breaches involving lost or stolen storage and the continued governmental legislation requiring data security and breach notification, the marketplace is ready for a secure storage solution. The Trusted Computing Group (TCG) has identified s... READ MORE

Storage Work Group Storage Security Subsystem Class: Opal Summary

Trusted Computing Group TCG Opal SSC Specification Summary January 2009 The Trusted Storage Architecture Core Specification developed in the Storage Work Group provides a comprehensive definition of TCG-related functions for a TCG trusted storage device. However, trusted storage devices for particular target markets do not need to implement all Core Specification functionalit... READ MORE

Trusted Computing Group Certifies Three IF-MAP Servers for Security Automation, Correlation of Metadata

The amount of metadata generated by all the devices on the network is exploding. Security automation has become a big category and way to coordinate all this data so networks become smarter, even self-healing, while protecting critical data, systems and the network itself. Trusted Computing Group created its IF-MAP (Metadata Access Protocol) to enable this coordination. IF-MAP is a standard clie... READ MORE

Circle of Trust

For more information on joining the Trusted Computing Group as a corporate or liaison member, please visit: Join Now! How-To Architect's Guides: TCG has published a series of architect's guides that provide step-by-step blueprints with examples and tips. In each of the guides, companies worldwide have built on TCG's specifications to provide tools that provide security. Now those in the trench... READ MORE

PC Client TPM Certification

PC Client TPM Certification The TCG has accepted requirements created by the Compliance PC Client TPM Sub Work Group for a TPM product to achieve certification and receive recognition from TCG on the list below.  For TCG members looking for information on how products may be added to the PC Client TPM Certified Products List, please review the TCG Certification Program Page.  For non-TCG... READ MORE

Authentication

Authentication Trusted Platform Module (TPM): Built-in Authentication To date, more than 500 million PCs have shipped with the Trusted Platform Module (TPM), an embedded crypto capability that supports user, application, and machine authentication with a single solution. Enterprise systems from a variety of vendors, including Dell, HP, Lenovo and others, include the TPM, as do a new class of u... READ MORE

Cybersecurity Innovation Forum and Expo

Cybersecurity Innovation Forum and Expo January 28, 2014 - January 30, 2014 Baltimore, MD The 2014 Cybersecurity Innovation Forum is a three-day event sponsored by the National Cybersecurity Center of Excellence (NCCoE) with the Department of Homeland Security, the National Institute of Standards and Technology, and the National Security Agency as primary participating organizations. Cybersec... READ MORE

TPM 2.0 Library Specification Approved as an ISO/IEC International Standard

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). The specification was submitted to the ISO/IEC JTC 1* by the Trusted Computing Group (TCG), following the JTC 1 Publicly Available Spe... READ MORE

Specifications in Public Review

TCG Draft Documents Currently in Public Review: TCG Storage Security Subsystem Class: Ruby Version 1.0 Revision 1.00 Storage Work Group Specification Review Period: November 2, 2018 - January 2, 2019 5:00pm Pacific   Protection Profile Automotive-Thin Specific TPM for TCG TPM 2.0 Automotive Thin Profile Family "2.0" Level 00 Version 0.25 Security Evaluation Work Group S... READ MORE