 |
A heightened lack of trust in software is at the heart of a different approach to IT Security, generally known as trusted computing. Aberdeen’s analysis of 41 companies with current deployments involving a hardware root of trust – either Trusted Platform Modules (TPMs) or Self-Encrypting Drives (SEDs) – and comparison with 86 companies who did not show that companies deploying hardware roots of trust realized a cost advantage of more than $80 per endpoint per year, in addition to enhanced security and compliance and a generally transparent end-user experience.
Request Free! |