X hits on this document

PDF document

The Trusted Platform Module provides a protected space for key opera- - page 1 / 2

3 views

0 shares

0 downloads

0 comments

1 / 2

Protecting Your Vital Business Data with the Trusted Platform Module

Connected businesses deliver a universe of new capabilities and convenience to customers, employees, and IT. But connectivity also exposes your data assets to hackers or malicious insiders. To protect networked systems and data, most businesses opt for a security software deployment, because of its low cost and configuration flexibility. But the unfortunate fact is that relying on software alone puts your network at significant risk of successful attack or unauthorized penetration. Enhancing software solutions with security that is rooted in hardware can significantly improve your defenses and increase your peace of mind.

The Trusted Platform Module: Hardware-Based Protection for Business

The Trusted Platform Module (TPM) is a component on the PC motherboard that is specifically designed to enhance platform security above-and-beyond the capabilities of today’s software. Defined by the Trusted Computing Group’s public specification, the TPM provides hardware-based protection for the encryption and digital signature keys that secure your data’s confidentiality. The TPM also provides a hardware-based authentication mechanism that strengthens existing network-access controls.

The Trusted Platform Module provides a protected space for key opera-

tions and other security critical tasks that are not protected today. Using specifically

designed hardware and software, the TPM secures encryption and signature keys at

their most vulnerable stages—operations when the keys are being used unencrypted

in plain-text form. The TPM is specifically designed to shield unencrypted keys and

platform authentication information from software-based attacks.

Document info
Document views3
Page views3
Page last viewedThu Oct 27 05:57:34 UTC 2016
Pages2
Paragraphs45
Words934

Comments