31 October, 2014
The attacks and hacks keep coming. Atmel, a long-time TCG member and provider of the TPM, has commented in a new blog, “Shouldn’t Security Be a Standard?”. Indeed.
As Atmel says, “…TPM, which stands for Trusted Platform Module, can be thought of as a microcontroller that can take a punch, and come back for more.”
We’ve been saying this for a while. But many IT and security professionals are not getting the message. In fact, the TPM is included -and has been for years – in enterprise PCs and servers. There is widespread support, easy to do, via Windows 7 and 8 and Server. In fact, some key security functions that users are paying for require the TPM.
Atmel sums it up here:
“The TPM is a perfect fit for overall security. So, just how does the TPM increase security? There are four main capabilities:
1. Furnish platform integrity
2. Perform authentication (asymmetric)
3. Implement secure communication
4. Ensure IP protection.”
Read more here from Atmel: http://ow.ly/CSIsP.
More details on the TPM, ideas to use and resources:Network Security.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.