Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
![Cover Image](https://cdn.ttgtmedia.com/bitpipe/covers/1282673552_441_lg.jpg)
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, the TPM and SED offer all the advantages of hardware for forming device identity and protecting data at rest.