Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Cover

Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, the TPM and SED offer all the advantages of hardware for forming device identity and protecting data at rest. 

Vendor:
Wave Systems Corp.
Posted:
Aug 24, 2010
Premiered:
Aug 24, 2010, 04:00 EDT (08:00 GMT)
Format:
Multimedia
Type:
Videocast
Already a Bitpipe member? Login here

Download this Videocast!