Trusted platform module News
April 22, 2013
Keeping data safe in mobile devices is the Holy Grail for preventing corporate data loss.
July 17, 2007
The integrity of the TPM chip is vital to the future of computer security and the value of Windows Vista's BitLocker technology. Cracking it could turn the IT industry on its ear.
Trusted platform module Get Started
Bring yourself up to speed with our introductory content
In an effort to get more workloads into the Azure cloud, Microsoft has developed a new system to protect data in Hyper-V VMs from unauthorized users in Windows Server 2016. Continue Reading
A hardware security module (HSM) is a physical device that provides extra security for sensitive data. Continue Reading
Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor on the PC or mobile device it is embedded in. Continue Reading
Evaluate Trusted platform module Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In a software-defined WAN showdown, network pro Will Murrell compares platforms from two top SD-WAN companies -- Cisco's Intelligent WAN and Viptela's Secure Extensible Network. Continue Reading
Microsoft hardened its Windows 8.1 update to make it enterprise- and government-worthy. Expert Michael Cobb outlines the new and improved features. Continue Reading
Manage Trusted platform module
Learn to apply best practices and optimize your operations.
SD-WANs are an option for enterprises that want to reduce network expenses, but watch out for internet vulnerabilities. Network pros are choosing a multistep approach to SD-WAN security. Continue Reading
The VMware ESXi hypervisor, particularly its kernel, offer several security features vital to a secure VMware cloud environment. Virtualization expert Paul Henry reviews the different levels of ESXi security. Continue Reading
Most servers include a Trusted Platform Module, but you only want to turn it on and manage TPM when the server handles high-value encrypted workloads. Continue Reading
Problem Solve Trusted platform module Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The nearly ubiquitous TPM device is an often-overlooked tool in an infosec pro's arsenal. Expert Michael Cobb details the benefits of TPM security. Continue Reading
A basic BitLocker installation doesn't require any unusual steps, but deploying it on Windows Server 2012 comes with a few caveats. Continue Reading
When used as designed, trusted computing can provide a high level of security, but limitations and potential for abuse prohibits its usefulness. Continue Reading