Platform and Device Security Trusted Platform Module 2.0
Specification Provides Critical, Vendor Neutral Technology to Respond to
Security Demands in Today’s Volatile Threat Landscape
PORTLAND, Ore - Thursday, April 10th 2014 [ME NewsWire]
(BUSINESS
WIRE)-- The Trusted Computing Group (TCG) has announced the
availability of the TPM (Trusted Platform Module) 2.0 library
specification. TPM 2.0 provides a critical technology response to the
global need for a more secure computing environment.
Based on
contributions and feedback from TCG member companies and security
technology experts representing the world’s leading silicon makers,
device makers, software and solution providers, as well as researchers,
governments and academic institutions, TPMs provide a secure root of
trust to protect data in computers and mobile devices from digital and
physical attacks, theft or loss.
The TCG also is making available
the PC Client Platform TPM Profile (PTP) specification, the first in a
series of specifications to enable developers and manufacturers to
design TPMs into their products. Specifications for additional
platforms, including mobile devices and embedded systems, will follow.
Hundreds
of millions of TPMs are embedded into PCs, servers, networking gear,
embedded systems and other computing devices, where they help protect
computers against unauthorized changes from malware, rootkit attacks and
similar malicious activities. TPMs enable more secure processes within
the system, such as digital signatures and key exchanges. The TPM can
help ensure that unsafe, unverified or out-of-date systems don’t connect
to a corporate network and provides a cost-effective, built in hardware
root of trust that can be used to authenticate devices and users.
Addressing Global Demand for Data Security Best Practices
The
TPM 2.0 specification responds to the exponential explosion of devices
that require protection from cyber threats both inside and outside the
traditional enterprise system firewalls. With growing market demand for
enhanced security and privacy, TPM 2.0 offers comprehensive protections
based on hardware roots of trust. Together with support for upgraded
cryptographic algorithms, the TPM 2.0 specification is designed with
cryptographic agility to allow support for more algorithms in the
future.
Lastly, TPM 2.0 offers the flexibility for industry
implementations across a broad range of platforms including servers,
desktops, embedded systems, mobile devices and network equipment. In
order to accommodate all of these different platforms, the new
specification is written in a way that enables TCG to develop platform
specific specifications utilizing TPM 2.0 to meet the requirements of
their platform.
About the Trusted Computing Group
The
Trusted Computing Group (TCG) provides open standards that protect
business-critical data and systems, support secure authentication and
protect user identities and networks. TCG maintains a well-defined
standards development and review process to ensure best-of-class design
considerations and transparency with strong protection of intellectual
property rights in alignment with the international norms. More
information about the TCG can be found atwww.trustedcomputinggroup.org,
on Twitter at @trustedcomputin and on LinkedIn.
Names and brands are the property of their respective owners.
Photos/Multimedia Gallery Available: http://www.businesswire.com/cgi-bin/mmg.cgi?eid=50839654&lang=en
Contacts
PR Works, Inc.
Anne Price, +1-602-840-6495 or +1-602-330-6495
anne@prworksonline.com
Permalink: http://www.me-newswire.net/news/10632/en
No comments:
Post a Comment