Taking advantage of the inherent security provided by the Trusted Platform Module (TPM)
Can you really feel sorry for a person whose car is stolen when the keys are left in it? Surprisingly, in a quite similar manner, many IT administrators are doing just that by not using a security feature they have. The Trusted Computing Group’s root of trust, the Trusted Platform Module (TPM), is an integral part of virtually every enterprise level computer sold today.
The TPM, a secure cryptographic integrated circuit (IC), provides a hardware-based approach to manage user authentication, network access, data protection and more that takes security to higher level than software-based security. Perhaps surprisingly to many IT and operations staff, the TPM can be combined with widely used enterprise hardware such as network policy enforcement points, including Checkpoint firewalls, Cisco switchers and routers, and other 802.1x-compatible devices.