InvestorsHub Logo
Followers 13
Posts 186
Boards Moderated 0
Alias Born 10/23/2003

Re: dude_danny post# 72323

Sunday, 03/06/2005 1:54:15 PM

Sunday, March 06, 2005 1:54:15 PM

Post# of 249476
Dude_Danny - A must-read!!! We finally have real-world examples of TPM implementations that are IBM clients...meaning their National Semi's chips with Wave's IP. This was published just last month and the IBM clients use the T40 and T42 notebooks which means enterprises are definitely buying and implementing. This is only the beginning folks. From Danny's find:

A Large Global Pharmaceutical Company

A large global pharmaceutical trading company has begun to use the TPM and
related security software to enhance protection of wireless log-on credentials.....


A Large Apparel Manufacturer

A large multinational apparel manufacturer has begun to authenticate network users
via T42 notebooks equipped with fingerprint readers. Given the legal constraints that
new legislation such as Sarbanes-Oxley puts on companies to protect sensitive data
(e.g., human resource records, customer data, and financial information) stored on
and accessed through personal computers, management felt that the company
needed to protect its client systems further.
The company decided to have staff from human resources, the legal department, and
top management use two forms of authentication before granting them network
access. Implementation involved outfitting these employees with IBM T42 ThinkPads
equipped with the IBM Embedded Security Subsystem and integrated fingerprint
readers. IBM’s solution enabled multifactor authentication. With their registered
fingerprints and a password, these employees were able to log onto their systems
and the network......


An IT Infrastructure Supplier

A worldwide supplier of IT infrastructure has begun to use encryption to protect
sensitive data. The company has a broad line of products and services, but their main
objective is to help customers maximize application delivery by overcoming problems
such as slow load times, security threats, and overloaded servers.

Within the IBM security technologies, of particular interest to the company is the
encryption capability. Using IBM’s file and folder encryption software, users select
folders to be encrypted and drop sensitive data into these folders. In this way, every
file is decrypted as it is opened and encrypted as it is closed. To the user, everything
seems normal, since the encryption is done on the fly and does not inhibit system
performance. The experience is just like opening and closing files. But should a system be lost or stolen, anyone trying to view the data will see only gibberish.
Without being opened by an authenticated user, the files are unreadable. In addition
IBM’s TPM chip helps ensure that the sensitive encryption keys and passwords
required to decrypt information are kept secure. With IBM’s encryption technology,
field personnel are able to work efficiently with the data they need close at hand, but
they can also be sure that the data is well protected......

Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.