Trusted Platform Module: Helping Secure Industrial PCs

Trusted Platform Module (TPM): Helping to Secure Industrial PCs

Trusted Platform Module (TPM): Helping to Secure Industrial PCs

Trusted Platform Module (TPM): Helping to Secure Industrial PCs

There is no such thing as perfect security. Passwords can be cracked, users’ access information phished, and malicious software installed via email attachments and USB thumb drives. Security challenges are especially tough when working with industrial PCs (IPC), which often run unattended in publicly-accessible spaces like hospitals, shop floors and meeting venues. One way to help ensure security in these unique environments is to deploy IPCs equipped with Trusted Platform Module (TPM) hardware integrated directly onto the system motherboard.

What is a Trusted Platform Module (TPM)?

TPM employs a specialized chip that stores protected key information in a tamper-proof medium to authenticate host system hardware. The chip includes a unique Endorsement Key that is baked into the module at manufacture – like a digital fingerprint – to establish the trustworthiness of data and applications. Importantly, this cross-platform solution engages at the lowest level of system operation, protecting against unauthorized firmware and software modifications that can undermine system integrity.

Utilization of a Trusted Platform Module boosts the value of solutions like whole disk encryption, which scrambles information stored on PC hard drives to render it unreadable to unauthorized parties. Windows BitLocker disk encryption, for instance, leverages TPM to ensure that initial system boot files are verified authentic and unmodified before disk data is decrypted for access.

The Security Risks Of Industrial Computers

Widely deployed in data-sensitive industries like financial services and health care, TPM addresses security risks common to rugged, remote and industrial environments. For instance:

  • Remote systems may not be frequently attended, either by users or IT staff, increasing the risk of compromised hardware.
  • IPCs deployed in public or open areas can be tampered with by passers by, including the use of USB flash drives to install malicious software.
  • Theft is a serious risk in many industrial scenarios. TPM hardens systems against intrusion, even in instances where the system has fallen into attackers’ hands.

IT managers deploying IPCs rightly focus on issues that impact systems in rugged and industrial environments. Fanless cooling, sealed cases, and ruggedized designs are all vital considerations. But in an increasingly threat-prone environment, data security simply can not be ignored. By deploying TPM-enabled IPCs, organizations gain a vital level of assurance, even in cases where hardware has the potential to be stolen or tampered with.

We’ll be talking more about key security technologies in IPC in the coming weeks. Be sure to subscribe to The I/O Hub for new post updates.

If you’d like to talk more about data security, stop by and see us at RSA 2017 in San Francisco starting February 13th. We’ll be showing off our new 4G-capable systems and the rest of our industrial PC hardware at booth #S2048 in the South Expo hall.

Find Your Computer Here

Leave a Comment

Your email address will not be published.