Chowder, from FAQs:
What Makes the TPM a Good Option for My Organization?
The TPM is a technology that was endorsed by the industry, and built on open specifications set by the Trusted Computing Group. The TPM was designed specifically to protect against software and network-based attacks. In contrast, most security is proprietary and expensive, aimed at simply patching an existing vulnerability.
The TPM is broadly deployed. Available from all the major PC OEMs, the TPM has been shipped on nearly 500 million PCs to date and is a standard component in business PCs. Chances are that most, if not all, of the PCs in your organization are already TPM-equipped.
Who is using the TPM?
In the world of security, it's challenging to convince companies to discuss their solutions. PriceWaterhouseCoopers, PwC, the world's largest tax advisory and auditing firm, is using the TPM to protect its systems and information for 150,000+ users. Boeing, BAE Systems, General Dynamics and Rockwell Collins have set up TPM pilot programs for stronger authentication.
Additionally, there's been growing interest and support from the National Security Agency (NSA), which has dedicated an entire division to driving research, holding conferences and educating the commercial sector on the benefits of Trusted Computing technologies like the TPM. In Europe, the United Kingdom's Information Assurance authority (CESG) has published recommendations for the use of TPMs for devices within government agencies.
Is it Difficult or Complicated to Activate the TPMs in My Organization?
No. Wave Systems makes turning on and managing the TPMs in your organization easy and hassle free. Wave's EMBASSY® Remote Administration Server (ERAS) can turn on the TPMs remotely and provides full management for the keys. Because Wave's software follows the specifications established by the TCG, ERAS can manage the TPMs on any business PC from any OEM.