Trusted Computing: Establishing Device Authentication

Trusted Computing: Establishing Device Authentication


The secret to better IT security may be at your fingertips. More likely than not, your PC contains a Trusted Platform Module (TPM), security chip on its motherboard. Acting as a highly secure “container” for user and device keys, this tiny chip allows organizations to improve their security by enabling strong identity for each user PC. In turn, these IDs can be used to ensure that only “known” machines are allowed access to the network. 


Steven Sprague President & CEO, Wave Systems Corp.

Wave Systems, a leading provider of client and server software for hardware-based security, enables organizations to know who is connecting to their IT infrastructure, protect corporate data and strengthen the boundaries of their networks. Since taking the helm as CEO, Mr. Sprague has played an integral role driving the industry transition to adopt hardware-based security and has guided Wave to a position of market leadership in enterprise management of self-encrypting hard drives and Trusted Platform Module security chips.

Wave Systems Corp.
24 Aug 2010
Aug 24, 2010
Already a Bitpipe member? Login here

Download this Videocast!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.