Authentication | Trusted Computing Group (original) (raw)

Date Published: March, 01, 2015

Authentication

Trusted Platform Module (TPM): Built-in Authentication

To date, more than 500 million PCs have shipped with the Trusted Platform Module (TPM), an embedded crypto capability that supports user, application, and machine authentication with a single solution. Enterprise systems from a variety of vendors, including Dell, HP, Lenovo and others, include the TPM, as do a new class of ultrabooks for both business and home use.

The TPM, a simple, yet revolutionary concept, ensures only authorized users and authorized PCs are on an enterprise network. It also acts as a secure vault for certificates, keys and passwords, negating the need for costly tokens.

TPM Solutions For:

Platform Integrity

Malware Prevention

Email Security

Multi-Factor Authentication

Remote and Wireless Access Security

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More

This website uses cookies, and also collects some information using Google Analytics. Please review our Privacy Policy for more details. Accept

Privacy & Cookies Policy