Endpoint Security: Hardware Roots of Trust

A heightened lack of trust in software is at the heart of a different approach to IT Security, generally known as trusted computing. Aberdeen's analysis of 41 companies with current deployments involving a hardware root of trust - either Trusted Platform Modules (TPMs) or Self-Encrypting Drives (SEDs) - and comparison with 86 companies who did not show that companies deploying hardware roots of trust realized a cost advantage of more than $80 per endpoint per year, in addition to enhanced security and compliance and a generally transparent end-user experience.

Request Free!