`
`Enterprise Security: Putting the TPM to Work
`
`
`What is the best way to cost-effectively maximize enterprise information security? Consider a tool already
`at your disposal: the Trusted Platform Module, a security and cryptography chip installed in more than
`100 million enterprise-class PCs. Learn how to put the TPM to work to unlock the full potential of 802.1X,
`VPNs, and authentication, and to improve your overall information security posture.
`
`The Trusted Platform Module (TPM) Secures Endpoints
`Want to dramatically improve the health and security of your enterprise endpoints? Many organizations
`already have a security tool at the ready: the Trusted Platform Module (TPM), a hardware-based security
`and cryptography chip built into virtually every enterprise-class desktop and laptop computer—PC or
`Mac—that ships today, as well as numerous consumer and SMB configurations. In fact, more than 100
`million computers shipped to date have a TPM installed, and a number of RFPs from the Fortune 1000,
`as well as numerous government agencies, including the Department of Defense, explicitly require a TPM
`for all new computers.
`
`Even though the chip is widely available, and dedicated management tools ship with enterprise PCs,
`many organizations have not yet put this valuable security tool to work. Perhaps that is because many IT
`managers report familiarity with the chip, but not its application.
`
`In fact, an increasing number of hardware and software tools—with many more under development—now
`exploit the TPM. As a result, a growing number of enterprises have begun leveraging the TPM to provide
`crucial business capabilities, including protecting data at rest, making strong client authentication easier
`and more affordable, and implementing network access controls to improve overall endpoint security.
`
`Hardware-Based PC Security
`What exactly can the TPM do? For starters, the TPM can augment a PC with a secure hardware reposi-
`tory for safeguarding digital certificates, passwords, and other essential user credentials. The TPM also
`facilitates key management and escrow for verifying the identity of a PC; can securely sign, encrypt, and
`decrypt e-mails and digital documents; manages full-drive encryption; provides the second factor in multi-
`factor authentication; and helps assess the security and integrity of the host device.
`
`Foundation of Trust
`Technology vendors are releasing products which utilize the TPM in
`The TPM creates a
`ever more innovative ways. For example, many PC manufacturers,
`hardware-based founda-
`including HP, Lenovo and others, ship TPM-based PC security software
`tion of trust, enabling
`tools, such as password vaults, as part of their standard enterprise
`enterprises to implement,
`client build, while Microsoft Vista BitLocker utilizes the TPM for secure
`manage, and enforce a
`start-up. On that front, the forthcoming HyperSpace platform from
`number of trusted cryptog-
`Phoenix Technologies will check PC security, pre-boot, to authenticate
`raphy, storage, integrity
`a device’s identity, verify the integrity of trusted applications, and help
`management, attestation
`minimize the threat of malware. Finally, the Secure Notebook full-disk
`and other information
`encryption tool from Secude International AG secures access to the
`security capabilities.
`PC—and encrypted drives—using the TPM.
`
`Prevent Data Breaches
`In fact, many organizations are turning to full-disk encryption tools and self-encrypting hard drives, or
`planning to adopt Intel’s new enterprise chipsets (codenamed Danbury) to fully encrypt any hard drive.
`
`Copyright© 2008 Trusted Computing Group—Other names and brands are properties of their respective owners.
`
`APPL-1024
`APPLE INC. / Page 1 of 2
`
`
`
`Simply having such capabilities, however, is not enough, either to secure personally identifiable informa-
`Simply having such capabilities, however, is not enough, either to secure personally identifiable informa-
`tion in the event it is lost or stolen, or for complying with numerous data pri-
`tion in the event it is lost or stolen, or for complying with numerous data pri-
`Top TPM Applications
`vacy and security regulations. Rather, enterprises must actually enforce the
`vacy and security regulations. Rather, enterprises must actually enforce the
`Survey of current TPM users
`use of these tools. On that front, Embassy Trust Suites from Wave Systems
`use of these tools. On that front, Embassy Trust Suites from Wave Systems
`
`Corp. provides the requisite enforcement capabilities, as well as related key
`Corp. provides the requisite enforcement capabilities, as well as related key
`Network Access
`
`management tools, for organizations to manage a variety of strong
`management tools, for organizations to manage a variety of strong
` • Access control
`75%
`authentication and data security tools—including full-disk encryption—and
`authentication and data security tools—including full-disk encryption—and
` • Wireless (802.1x)
`74%
`demonstrate compliance with numerous regulations.
`demonstrate compliance with numerous regulations.
` • VPN (IPsec)
`74%
`
` • Device authentication
`71%
`
`Secure Servers Secure Servers
` • Device attestation
`48%
`While initial TPM applications have focused on PCs, the TPM also secures
`While initial TPM applications have focused on PCs, the TPM also secures
`Data Protection
`
`servers, and numerous manufacturers, including IBM and Dell, now build the
`servers, and numerous manufacturers, including IBM and Dell, now build the
` • Secure email
`75%
`TPM into their servers to enable trusted, server-side computing, and to
`TPM into their servers to enable trusted, server-side computing, and to
` • Full-disk encryption
`67%
`harden all client/software interactions. In fact, a recent Forrester Research
`harden all client/software interactions. In fact, a recent Forrester Research
` • File/folder encryption
`63%
`report recommends enterprises now begin adopting servers containing a TPM
`report recommends enterprises now begin adopting servers containing a TPM
` • Key management
`54%
`to process all high-value transactions.
`to process all high-value transactions.
`User Authentication
`
`
` • PC login
`88%
`
`Future TPM Applications Future TPM Applications
` • User authentication
`83%
`As that suggests, software and hardware manufacturers are finding new ways
`As that suggests, software and hardware manufacturers are finding new ways
` • Secure boot sequence 79%
`to put the TPM to work. Yet numerous applications for the TPM already exist,
`to put the TPM to work. Yet numerous applications for the TPM already exist,
` • Smart cards
`45%
`to help enterprises improve overall information security, protect data at rest or
`to help enterprises improve overall information security, protect data at rest or
` • Fingerprint biometrics
`39%
`in transit, and demonstrate compliance with numerous data security regula-
`in transit, and demonstrate compliance with numerous data security regula-
`Source: Aberdeen Group, 2008
`tions. In other words, with the TPM already at large in the enterprise, why not
`tions. In other words, with the TPM already at large in the enterprise, why not
`put it to use now?
`put it to use now?
`
`
`
`
`TPM Success Stories
`
`Organizations in a number of vertical industries already utilize the TPM to manage full-disk
`encryption, verify PC integrity, and safeguard data at rest:
`
`• Financial Services: Publicly traded Fortune 500 firm determined that applying full-disk en-
`cryption costs far less than losing an unencrypted laptop, especially in this highly regulated
`industry. The CEO’s data security mandate: Don’t become a data breach headline.
`• Fast Food: Pizza-maker Papa Gino’s, with over 370 restaurants, uses Dell laptops and
`desktop with a built-in TPM to automatically encrypt all communications between stores and
`headquarters, and to secure passwords and bank account numbers. Ultimately, this helps it
`comply with multiple data security and privacy regulations, including the Payment Card In-
`dustry Data Security Standard (PCI DSS).
`• Big Pharma: A leading Japanese pharmaceutical manufacturer with more than 20,000
`seats deployed Lenovo PCs with a TPM, related digital certificate, and multifactor authenti-
`cation software. This enables the company to restrict and monitor access to sensitive and
`regulated data via its Virtual Private Network (VPN).
`• Law Firm: Practice with hundreds of personnel employs full-disk encryption to prevent data
`breaches, maintain attorney/client privilege, and avoid any damage to the firm’s reputation
`resulting from lost or stolen PCs.
`• High-Technology: World-renowned high-technology manufacturer’s field force (2,000+
`employees) carries laptops storing everything from client lists and product specifications to
`preferential sales prices and revenue forecasts. Using a TPM, all laptops are now automati-
`cally and completely encrypted, protecting this publicly traded company’s confidential data.
`
`Copyright© 2008 Trusted Computing Group—Other names and brands are properties of their respective owners.
`
`APPL-1024
`APPLE INC. / Page 2 of 2
`
`