www.design-reuse-embedded.com
Find Top SoC Solutions
for AI, Automotive, IoT, Security, Audio & Video...

Arm joins Trusted Computing Group, driving towards secure devices everywhere

community.arm.com, Jun. 19, 2019 – 

Arm participates widely in industry forums to advance security and ensure appropriate standards are implemented, with the aim of making the development of secure products easier. It's an important part of our vision for security across the industry, as we move towards what CEO Simon Segars has described as 'The Fifth Wave of Computing'.

As part of that work, we recently joined the Trusted Computing Group (TCG), as part of our commitment to enable secure devices wherever compute happens. TCG is a membership group that enables secure computing through open standards and specifications. The benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity.

Security is foundational in any connected device across all sectors, from smart home devices to industrial, automotive, smartphones, cloud data centres, networking infrastructure, high performance compute, and machine learning applications. Arm is engaging and collaborating with a diverse range of industry forums, developing the security standards of the future. We need to ensure that Arm-based platforms, across all market segments, offer robust security and interoperability in their respective ecosystems. TCG technologies, such as the Trusted Platform Module (TPM), are found today in Arm Chromebooks, laptops, and servers. Arm's participation as a member of TCG enhances our ability to provide robust security solutions for existing and emerging technologies.

Click here to read more...

 Back

Partner with us

List your Products

Suppliers, list and add your products for free.

More about D&R Privacy Policy

© 2024 Design And Reuse

All Rights Reserved.

No portion of this site may be copied, retransmitted, reposted, duplicated or otherwise used without the express written permission of Design And Reuse.