throbber

`
`Enterprise Security: Putting the TPM to Work
`
`
`What is the best way to cost-effectively maximize enterprise information security? Consider a tool already
`at your disposal: the Trusted Platform Module, a security and cryptography chip installed in more than
`100 million enterprise-class PCs. Learn how to put the TPM to work to unlock the full potential of 802.1X,
`VPNs, and authentication, and to improve your overall information security posture.
`
`The Trusted Platform Module (TPM) Secures Endpoints
`Want to dramatically improve the health and security of your enterprise endpoints? Many organizations
`already have a security tool at the ready: the Trusted Platform Module (TPM), a hardware-based security
`and cryptography chip built into virtually every enterprise-class desktop and laptop computer—PC or
`Mac—that ships today, as well as numerous consumer and SMB configurations. In fact, more than 100
`million computers shipped to date have a TPM installed, and a number of RFPs from the Fortune 1000,
`as well as numerous government agencies, including the Department of Defense, explicitly require a TPM
`for all new computers.
`
`Even though the chip is widely available, and dedicated management tools ship with enterprise PCs,
`many organizations have not yet put this valuable security tool to work. Perhaps that is because many IT
`managers report familiarity with the chip, but not its application.
`
`In fact, an increasing number of hardware and software tools—with many more under development—now
`exploit the TPM. As a result, a growing number of enterprises have begun leveraging the TPM to provide
`crucial business capabilities, including protecting data at rest, making strong client authentication easier
`and more affordable, and implementing network access controls to improve overall endpoint security.
`
`Hardware-Based PC Security
`What exactly can the TPM do? For starters, the TPM can augment a PC with a secure hardware reposi-
`tory for safeguarding digital certificates, passwords, and other essential user credentials. The TPM also
`facilitates key management and escrow for verifying the identity of a PC; can securely sign, encrypt, and
`decrypt e-mails and digital documents; manages full-drive encryption; provides the second factor in multi-
`factor authentication; and helps assess the security and integrity of the host device.
`
`Foundation of Trust
`Technology vendors are releasing products which utilize the TPM in
`The TPM creates a
`ever more innovative ways. For example, many PC manufacturers,
`hardware-based founda-
`including HP, Lenovo and others, ship TPM-based PC security software
`tion of trust, enabling
`tools, such as password vaults, as part of their standard enterprise
`enterprises to implement,
`client build, while Microsoft Vista BitLocker utilizes the TPM for secure
`manage, and enforce a
`start-up. On that front, the forthcoming HyperSpace platform from
`number of trusted cryptog-
`Phoenix Technologies will check PC security, pre-boot, to authenticate
`raphy, storage, integrity
`a device’s identity, verify the integrity of trusted applications, and help
`management, attestation
`minimize the threat of malware. Finally, the Secure Notebook full-disk
`and other information
`encryption tool from Secude International AG secures access to the
`security capabilities.
`PC—and encrypted drives—using the TPM.
`
`Prevent Data Breaches
`In fact, many organizations are turning to full-disk encryption tools and self-encrypting hard drives, or
`planning to adopt Intel’s new enterprise chipsets (codenamed Danbury) to fully encrypt any hard drive.
`
`Copyright© 2008 Trusted Computing Group—Other names and brands are properties of their respective owners.
`
`APPL-1024
`APPLE INC. / Page 1 of 2
`
`

`

`Simply having such capabilities, however, is not enough, either to secure personally identifiable informa-
`Simply having such capabilities, however, is not enough, either to secure personally identifiable informa-
`tion in the event it is lost or stolen, or for complying with numerous data pri-
`tion in the event it is lost or stolen, or for complying with numerous data pri-
`Top TPM Applications
`vacy and security regulations. Rather, enterprises must actually enforce the
`vacy and security regulations. Rather, enterprises must actually enforce the
`Survey of current TPM users
`use of these tools. On that front, Embassy Trust Suites from Wave Systems
`use of these tools. On that front, Embassy Trust Suites from Wave Systems
`
`Corp. provides the requisite enforcement capabilities, as well as related key
`Corp. provides the requisite enforcement capabilities, as well as related key
`Network Access
`
`management tools, for organizations to manage a variety of strong
`management tools, for organizations to manage a variety of strong
` • Access control
`75%
`authentication and data security tools—including full-disk encryption—and
`authentication and data security tools—including full-disk encryption—and
` • Wireless (802.1x)
`74%
`demonstrate compliance with numerous regulations.
`demonstrate compliance with numerous regulations.
` • VPN (IPsec)
`74%
`
` • Device authentication
`71%
`
`Secure Servers Secure Servers
` • Device attestation
`48%
`While initial TPM applications have focused on PCs, the TPM also secures
`While initial TPM applications have focused on PCs, the TPM also secures
`Data Protection
`
`servers, and numerous manufacturers, including IBM and Dell, now build the
`servers, and numerous manufacturers, including IBM and Dell, now build the
` • Secure email
`75%
`TPM into their servers to enable trusted, server-side computing, and to
`TPM into their servers to enable trusted, server-side computing, and to
` • Full-disk encryption
`67%
`harden all client/software interactions. In fact, a recent Forrester Research
`harden all client/software interactions. In fact, a recent Forrester Research
` • File/folder encryption
`63%
`report recommends enterprises now begin adopting servers containing a TPM
`report recommends enterprises now begin adopting servers containing a TPM
` • Key management
`54%
`to process all high-value transactions.
`to process all high-value transactions.
`User Authentication
`
`
` • PC login
`88%
`
`Future TPM Applications Future TPM Applications
` • User authentication
`83%
`As that suggests, software and hardware manufacturers are finding new ways
`As that suggests, software and hardware manufacturers are finding new ways
` • Secure boot sequence 79%
`to put the TPM to work. Yet numerous applications for the TPM already exist,
`to put the TPM to work. Yet numerous applications for the TPM already exist,
` • Smart cards
`45%
`to help enterprises improve overall information security, protect data at rest or
`to help enterprises improve overall information security, protect data at rest or
` • Fingerprint biometrics
`39%
`in transit, and demonstrate compliance with numerous data security regula-
`in transit, and demonstrate compliance with numerous data security regula-
`Source: Aberdeen Group, 2008
`tions. In other words, with the TPM already at large in the enterprise, why not
`tions. In other words, with the TPM already at large in the enterprise, why not
`put it to use now?
`put it to use now?
`
`
`
`
`TPM Success Stories
`
`Organizations in a number of vertical industries already utilize the TPM to manage full-disk
`encryption, verify PC integrity, and safeguard data at rest:
`
`• Financial Services: Publicly traded Fortune 500 firm determined that applying full-disk en-
`cryption costs far less than losing an unencrypted laptop, especially in this highly regulated
`industry. The CEO’s data security mandate: Don’t become a data breach headline.
`• Fast Food: Pizza-maker Papa Gino’s, with over 370 restaurants, uses Dell laptops and
`desktop with a built-in TPM to automatically encrypt all communications between stores and
`headquarters, and to secure passwords and bank account numbers. Ultimately, this helps it
`comply with multiple data security and privacy regulations, including the Payment Card In-
`dustry Data Security Standard (PCI DSS).
`• Big Pharma: A leading Japanese pharmaceutical manufacturer with more than 20,000
`seats deployed Lenovo PCs with a TPM, related digital certificate, and multifactor authenti-
`cation software. This enables the company to restrict and monitor access to sensitive and
`regulated data via its Virtual Private Network (VPN).
`• Law Firm: Practice with hundreds of personnel employs full-disk encryption to prevent data
`breaches, maintain attorney/client privilege, and avoid any damage to the firm’s reputation
`resulting from lost or stolen PCs.
`• High-Technology: World-renowned high-technology manufacturer’s field force (2,000+
`employees) carries laptops storing everything from client lists and product specifications to
`preferential sales prices and revenue forecasts. Using a TPM, all laptops are now automati-
`cally and completely encrypted, protecting this publicly traded company’s confidential data.
`
`Copyright© 2008 Trusted Computing Group—Other names and brands are properties of their respective owners.
`
`APPL-1024
`APPLE INC. / Page 2 of 2
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket