Trusted Computing Group

Trusted Computing Group develops open standards for computing security.

General Information
Company Name
Trusted Computing Group
Founded Year
2003
Location (Offices)
Beaverton, United States +1
Founders / Decision Makers
Number of Employees
26
Industries
-
Funding Stage
-
Social Media

Trusted Computing Group - Company Profile

The Trusted Computing Group (TCG) is a global organization that develops open security standards and specifications based on root of trust enabling secure interoperable systems and networks across industries. The TCG category of secure computing has created billions of secure endpoints across industries and technologies. The Root of Trust is the foundation TCG specifications are based upon with proven concepts to ensure the integrity of systems, protection of data and security for networks. Through Open, end-to-end standards, TCG and its global membership of the leading PC and server, semiconductor, software, networking, services and mobile device makers create specifications and international standards free to developers, manufacturers and users. Trusted Computing is a category of computing with a fundamentally secure approach based on a root of trust.” 54 new endpoints every second.

Funding Rounds & Investors of Trusted Computing Group (0)

View All

There is no investment information

Latest News of Trusted Computing Group

View All

No recent news or press coverage available for Trusted Computing Group.

Similar Companies to Trusted Computing Group

View All
Intertrust - Similar company to Trusted Computing Group
Intertrust Building Trust for a Connected World
VeroGuard Systems Pty Ltd - Similar company to Trusted Computing Group
VeroGuard Systems Pty Ltd Changing the way the world looks at cybersecurity
GlobalPlatform™ - Similar company to Trusted Computing Group
GlobalPlatform™ The standard for secure digital services and devices
Trusted Computer Solutions - Similar company to Trusted Computing Group
Trusted Computer Solutions Empowering seamless and secure data access and transfer across multiple security domains.