Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Cover

Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, the TPM and SED offer all the advantages of hardware for forming device identity and protecting data at rest. 

Speaker

Steven Sprague President & CEO, Wave Systems Corp.

Wave Systems, a leading provider of client and server software for hardware-based security, enables organizations to know who is connecting to their IT infrastructure, protect corporate data and strengthen the boundaries of their networks. Since taking the helm as CEO, Mr. Sprague has played an integral role driving the industry transition to adopt hardware-based security and has guided Wave to a position of market leadership in enterprise management of self-encrypting hard drives and Trusted Platform Module security chips.

Vendor:
Wave Systems Corp.
Posted:
24 Aug 2010
Premiered:
Aug 24, 2010
Format:
Multimedia
Type:
Videocast
Language:
English
Already a Bitpipe member? Login here

Download this Videocast!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy