Arm Community
Arm Community
  • Site
  • User
  • Site
  • Search
  • User
Arm Community blogs
Arm Community blogs
Architectures and Processors blog Arm joins Trusted Computing Group, driving towards secure devices everywhere
  • Blogs
  • Mentions
  • Sub-Groups
  • Tags
  • Jump...
  • Cancel
More blogs in Arm Community blogs
  • AI blog

  • Announcements

  • Architectures and Processors blog

  • Automotive blog

  • Embedded and Microcontrollers blog

  • Internet of Things (IoT) blog

  • Laptops and Desktops blog

  • Mobile, Graphics, and Gaming blog

  • Operating Systems blog

  • Servers and Cloud Computing blog

  • SoC Design and Simulation blog

  • Tools, Software and IDEs blog

Tell us what you think
Tags
Actions
  • RSS
  • More
  • Cancel
Related blog posts
Related forum threads

Arm joins Trusted Computing Group, driving towards secure devices everywhere

Stuart Yoder
Stuart Yoder
June 19, 2019
1 minute read time.

Arm participates widely in industry forums to advance security and ensure appropriate standards are implemented, with the aim of making the development of secure products easier. It’s an important part of our vision for security across the industry, as we move towards what CEO Simon Segars has described as ‘The Fifth Wave of Computing’. 

As part of that work, we recently joined the Trusted Computing Group (TCG), as part of our commitment to enable secure devices wherever compute happens. TCG is a membership group that enables secure computing through open standards and specifications. The benefits of TCG technologies include protection of business-critical data and systems, secure authentication and strong protection of user identities, and the establishment of strong machine identity and network integrity.

Security is foundational in any connected device across all sectors, from smart home devices to industrial, automotive, smartphones, cloud data centres, networking infrastructure, high performance compute, and machine learning applications. Arm is engaging and collaborating with a diverse range of industry forums, developing the security standards of the future. We need to ensure that Arm-based platforms, across all market segments, offer robust security and interoperability in their respective ecosystems.  TCG technologies, such as the Trusted Platform Module (TPM), are found today in Arm Chromebooks, laptops, and servers. Arm's participation as a member of TCG enhances our ability to provide robust security solutions for existing and emerging technologies. 

We see security as a fundamental component of the overall solution we offer our customers. TCG is a key forum for determining security standards that will help the wider ecosystem provide secure devices and products based on these standards.  

Find out more about Arm security technologies via our Developer website.

Arm Security Technologies

Anonymous
Architectures and Processors blog
  • Introducing GICv5: Scalable and secure interrupt management for Arm

    Christoffer Dall
    Christoffer Dall
    Introducing Arm GICv5: a scalable, hypervisor-free interrupt controller for modern multi-core systems with improved virtualization and real-time support.
    • April 28, 2025
  • Getting started with AARCHMRS Features.json using Python

    Joh
    Joh
    A high-level introduction to the Arm Architecture Machine Readable Specification (AARCHMRS) Features.json with some examples to interpret and start to work with the available data using Python.
    • April 8, 2025
  • Advancing server manageability on Arm Neoverse Compute Subsystem (CSS) with OpenBMC

    Samer El-Haj-Mahmoud
    Samer El-Haj-Mahmoud
    Arm and 9elements Cyber Security have brought a prototype of OpenBMC to the Arm Neoverse Compute Subsystem (CSS) to advancing server manageability.
    • January 28, 2025