Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms


Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, the TPM and SED offer all the advantages of hardware for forming device identity and protecting data at rest. 


Steven Sprague President & CEO, Wave Systems Corp.

Wave Systems, a leading provider of client and server software for hardware-based security, enables organizations to know who is connecting to their IT infrastructure, protect corporate data and strengthen the boundaries of their networks. Since taking the helm as CEO, Mr. Sprague has played an integral role driving the industry transition to adopt hardware-based security and has guided Wave to a position of market leadership in enterprise management of self-encrypting hard drives and Trusted Platform Module security chips.

Wave Systems Corp.
24 Aug 2010
Aug 24, 2010
Already a Bitpipe member? Login here

Download this Videocast!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.