sponsored by Wave Systems Corp.
Posted:  24 Aug 2010
Premiered:  Aug 24, 2010
Format:  Multimedia
Type:  Videocast
Language:  English

Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, the TPM and SED offer all the advantages of hardware for forming device identity and protecting data at rest. 


Steven Sprague
President & CEO, Wave Systems Corp.

Wave Systems, a leading provider of client and server software for hardware-based security, enables organizations to know who is connecting to their IT infrastructure, protect corporate data and strengthen the boundaries of their networks. Since taking the helm as CEO, Mr. Sprague has played an integral role driving the industry transition to adopt hardware-based security and has guided Wave to a position of market leadership in enterprise management of self-encrypting hard drives and Trusted Platform Module security chips.

Data Security | Hardware | Hardware Management | Identity Management | Platform as a service | Vulnerability Assessments | Vulnerability Management

View All Resources sponsored by Wave Systems Corp.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement