![]() |
|
Advances in technology drive growth in all industries, yet trust in this technology can be lost in an instant if personal data and valuable information is compromised. Technology is fallible, but the risks can be minimised if effective measures are put into place. | |
General Data Protection Regulation (GDPR) | |
GDPR has come into force to better protect and enable the privacy rights of individuals. It holds every company accountable for managing and protecting the personal data of prospects, clients and employees. The majority of companies will already have systems in place, but GDPR has strict data protection guidelines that have to be adhered to. |
|
Secure TPM Enabled Technology |
|
A Trusted Platform Module (TPM) is a chip, used in computer technology to support security and privacy at levels that software is unable to achieve. In short, TPM generates, stores and limits the use of cryptographic keys, to tightly control access to important and valuable data. TPM doesn’t operate independently; the chip has to be integrated into the system hardware in order to respond to commands and operate. |
|
TPM 2.0 – When Security is a Priority |
|
If security is a priority in your organisation (and it should be), the latest and most secure version is TPM 2.0. This option allows for greater crypto agility and has achieved ISO/IEC 11889:2015 standards. The TPM 2.0 lock out policy has also been configured by Windows for consistent attack protection. |
|
FPC-7900 Advanced Box PC with TPM 2.0 |
|
The integration of privacy and security features are a core component in the design of ARBOR Technology’s embedded technology. This includes the adoption of TPM 2.0 in our most advanced Box PC solution; the FPC-7900. |
|
