[TODAY] Enabling the Mobile Workforce

Trusted Computing

Definition - What does Trusted Computing mean?

'Trusted computing’ (TC) is the concept that technologies have built-in processes to revolve basic security problems and user challenges.

It is also a term used by a trade group called the Trusted Computing Group (TCG) that helps to set standards for devices and technologies.

Techopedia explains Trusted Computing

Some elements of trusted computing have to do with making devices in ways that are consistent, so that the security community can apply guidelines, standards and strategies universally.

For example, one element of trusted computing involved design for secure input/output. Here, engineers and others look at different types of malware such as spyware and key loggers to understand how systems can be defended from these kinds of attacks.

The use of new encryption keys, hash encryption strategies and other state-of-the-art security standards are also good examples of a trusted computing approach. Over time, the community of database engineers has created hashing systems that effectively block hackers from capturing many kinds of data through unauthorized database use.

The use of more modern security standards, universally applied to hardware and technology products, is supposed to be able to create a safer overall an environment for users. The nonprofit Trusted Computing Group benefits from the involvement of major manufacturers and other parties involved in offering business and consumer facing products to the world. Much more information on this term and what it can entail can be found on the TCG website which features a running tally of 'total secured endpoints’ where officials claim to have put in place superior security architecture.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.