by TCG in Action Share At the Trusted Cyber Collaboration Workshop, experts from Infineon, Wave Systems, HP, Wave Systems and Asguard Networks addressed a number of trending security issues and the role of trust in helping solve them.
John Fitzgerald of Wave Systems addressed a commonly asked question for TCG: how to use the TPM. In this case, the TPM acts as a virtual smart card. Why use the TPM for this application?
Fitzgerald notes that passwords are easy to break and complex to manage, as well as expensive. Poor passwords are a leading factor for breaches. Multi-factor authentication is stronger, but there are many choices and expensive and complex to manage as well. In fact, costs can be up to $150 per user, according to Gartner.
The TPM is included in enterprise PCs and can be turned into an inexpensive and more easily managed smart card. It’s tied to the platform and can’t be lost. Its hardware root of trust offers strong authentication and allows only known users and known devices to access enterprise systems and data. TPMs in systems with Windows 7, 8 and 8.1 can be used as virtual smart cards.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.