The TPM, a secure cryptographic integrated circuit (IC), provides a hardware-based approach to manage
user authentication, network access, data protection and more that takes security to higher level than
software-based security. Perhaps surprisingly to many IT and operations staff, the TPM can be combined
with widely used enterprise hardware such as network policy enforcement points, including Checkpoint
firewalls, Cisco switchers and routers, and other 802.1x-compatible devices.