Embedded and rugged edge compute systems collecting and processing sensitive data become targets for cyberattacks as they connect to the IoT. Intellectual property, personal data and machine commands become increasingly susceptible to exfiltration or manipulation with increased connectivity. To protect its systems — as wells as the people, products and services dependent on their security — Premio integrates trusted platform modules (TPMs) with TPM 2.0 standards. Learn more
Security Standard
TPM 2.0 is the international standard for microcontrollers dedicated to hardware security.
Discrete Module
The tamper-resistant TPM cryptoprocessor is physically connected to the motherboard.
IoT Core Edition
Control access to protected data at connected endpoints and cloud interfaces.
TPM standards ensure secure data storage, as well as platform authentication and integrity auditing. TPM 2.0’s three hierarchies permit multiple root keys for improved security over TPM 1.2 standards. This provides better resistance to malware and rogue applications affecting legitimate processes.
TPMs scan BIOS to detect unauthorized changes to the system.
The TPM locks the system when the hard drive is unexpectedly relocated.
The TPM can enable BitLocker Drive encryption to determine if conditions are safe for booting.