Mrs. Vital has a question. Help please.
Last evening I was sharing some of the good news of the week with my sweet wife, who by jove, managed to get the gist of the technical jargon and much of the subtle implications from RSA on the first read.
But this, from the SKS transcript, which i highlight in bold, elicited a question...
"Then we sell solutions that are there for the corporation to manage their install base of Trusted Platform Modules. We actually, just the other day, announced our remote administration tool, where with no touch by the IT Department of a single machine, they can go and actually turn the Trusted Platform Modules on and engage them in their network electrically."
The question being, "what keeps someone/anyone outside of the IT Dept. from doing the same? I thought security was at the desktop?"
I couldn't give her a good answer so I turn to the board.
TIA
Elan