Association Session Will Help Attendees Understand how to Implement Trusted Computing Across Wide Range of Application
PORTLAND, Ore., April 17, 2015 Next week at the RSA Conference 2015 Trusted Computing Group association session, members will showcase more than 20 examples of trusted computing for enterprise, IoT, network, embedded and mobile computing security – the widest variety and largest number of trusted computing demos ever shown at RSA.
RSA attendees can see the demonstrations during the half-day session “Should We Trust Mobile Computing, IoT and the Cloud? No, But There Are Solutions” in Moscone West 2002/2006, 9 a.m. – 1 p.m. Pacific on Monday, April 20.
Solutions include:
Panels will address the concepts of “do I know you, can I trust you?” with an emphasis on the rapidly growing amount of sensor data, personally identifiable information, financial transactions and health data, and intellectual property going through a variety of networks and touching a variety of devices.
Attendees will have the opportunity to win a one terabyte SSD 850 EVO self-encrypting drive from Samsung; a Raspberry Pi 2 IoT development kit with a TPM 1.2 daughterboard from Infineon; and a Microsoft Surface Pro 3 tablet, including Infineon TPM 2.0, also from Infineon.
About TCG
More information and TCG’s specifications and work groups are available at the Trusted Computing Group’s website, trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.
Brands and trademarks are the property of their respective owners.
Tweet this: #RSAC @TrustedComputin demos: from the #IoT to #ICS to cloud, TPM & TNC play big roles in securing data, devices, networks. See all http://bit.ly/1z0RJQ9
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.