Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms

Cover

Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, the TPM and SED offer all the advantages of hardware for forming device identity and protecting data at rest. 

Vendor:
Wave Systems Corp.
Posted:
Feb 8, 2021
Premiered:
Aug 24, 2010
Format:
Multimedia
Type:
Videocast
Already a Bitpipe member? Log in here

Download this Videocast!