SHARE
Facebook X Pinterest WhatsApp

Mocana Now Working With TPM 2.0 Platform

thumbnail
Mocana Now Working With TPM 2.0 Platform

Mocana, a security solutions provider for the Internet of Things (IoT), announced on Wednesday support for Trusted Platform Module (TPM) 2.0.

Written By
thumbnail
David Curry
David Curry
Jul 25, 2018

Mocana, a security solutions provider for the Internet of Things (IoT), announced on Wednesday support for Trusted Platform Module (TPM) 2.0. Integration of the module allows device manufacturers to build products that meet the highest cybersecurity standards.

Customers use Mocana to easily secure storage, communications, and firmware updates for IoT devices.

See also: Research Suggests Microsoft Azure Cheapest at Scale for IoT

Cybersecurity is becoming a more prominent issue for IoT developers after a series of mishaps exposed the vulnerabilities of thousands of connected devices feeding back to a network.

TPM 2.0 is used by most PC and notebook manufacturers. For Windows 8.1 and 10, all computers need a TPM 2.0 module to pass Microsoft’s hardware certification. Google includes TPM 2.0 in all Chromebooks.

“As the pace of cyber attacks on IoT and industrial systems increases, there is a critical need for stronger security on IoT devices,” said Srinivas Kumar, vice president of engineering at Mocana.

“TPM technology has been used broadly to prove the identity of a computer or financial transaction device. We are now enabling the latest TPM 2.0 feature set on IoT devices. This will significantly reduce the effort for our customers to leverage TPM technology and avoid reading the more than 3,000 pages of TPM technical documentation.”

Benefits of TPM 2.0 include support for advanced ciphers, such as Elliptic Curve Cryptography, 256 and 512-bit Secure Hash Algorithms 2; multiple ownership of keys; support for Windows and Linux systems; and better seeding for entropy.

thumbnail
David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Recommended for you...

AI Agents Need Keys to Your Kingdom
Securing Patient Intake: The Hidden Threats to Protected Health Information
Yaron Galant
Dec 9, 2025
AI That Plays by Your Rules: Why Enterprise MCP Integration Changes Everything
Tim Freestone
Dec 3, 2025
Addressing the Hidden Security Risks of AI Agents in Industrial Operations

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.