Data Security Has Never
Been This Easy
GIGABYTE   X58 / P45 / G45 / P43    Ultra TPM      Motherboards
Plug & Play 2048 bit USB Key with
Hardware based TPM security
Overview
Setting a New Standard for Motherboard Security
In today's computing environment, security threats such as viruses, worms, trojan attacks, malicious hacking and data/identity theft, etc. are not only happening more frequently, but the cost to victims of such attacks are also on the rise. While software solutions are able to protect data to a certain degree, a higher level of security measures is needed to ensure you do not become the next victim.

 

That is where a hardware based solution such as TPM (Trusted Platform Module) technology can help. Trusted Platform Modules are hardware based security microcontrollers that store keys, passwords and digital certificates and protects this data from external software attacks and physical theft.

2048 bit
Encryption Key
 

Recognizing the need to protect users against today's computing security threats, GIGABYTE is the first motherboard manufacturer to equip their motherboards with an onboard TPM Module from Infineon with 2048 bit encryption key. But, they didn't stop there. GIGABYTE has paired their TPM module with a security software interface called GIGABYTE Ultra TPM, providing the Industry's highest level of data security through a hardware + software design.

In order to better understand GIGABYTE Ultra TPM and how it works, let's first get a crash course in how data security works.

 
Overview
 

                                  Easy to Secure Your Data
                              With Infineon's TPM chip built-in, GIGABYTE provides TPM                          hardware-based encryption and decryption with digital signature keys                   to ensure a maximum level of data protection with 2048 bit encryption.              GIGABTE Ultra TPM provides an added layer of security by allowing users to store their digital signature key on a USB thumb drive, so when they step away from their system, they can take the key with them, locking up their data and preventing unauthorized access while they are away. When making the portable user key, GIGABYTE Ultra TPM auto deletes the user key in the hard drive, ensuring the maximum level of data protection.

Nearly Impossible to Crack
Most data security solutions, whether they are software or hardware based, rely on a process of encryption and decryption to secure digital data. Encryption takes your data and transforms it, making it unreadable to anyone that doesn't have a "key" to read it. The key basically tells how that information was transformed, and acts as a password for the data. Once you have the key, you are able to undo the encryption, a process called decryption, making the data readable again.
 
 

Key size basically determines the level of security; 1 bit keys being the least secure, all
the way up to the 2048 bit key found in GIGABYTE's Ultra TPM. How secure is 2048 bit
security? The number of possible combinations from a 2048 bit number is 22048, which
is 3.23 x 10616. That is 3 followed by 616 zeros or
30000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000

That is how many possible different number combinations a 2048 bit key has. A computer capable of one million instructions per second would have to work for 1014 years to crack the key. Is it any wonder why this is considered military

Overview
 
Hardware + Software vs Software Based Security
 
 
GIGABYTE Ulltra TPM
Hardware + Software
based Encryption
 
TPM Hardware based
Security
 
Software based
Encryption
  Platform authentication with
integrated security solution
  Platform authentication with
integrated security solution
  Low Level of security
Keys and secrets protected by
dedicated hardware
Keys and secrets protected
by dedicated hardware
Key can be deleted completely
from system offering the highest
level of security possible
   
  High protection against logical
attacks
  High protection against
logical attacks
  Low protection against
logical attacks
  Highest level of protection
against physical attacks
  High protection against
physical attacks
  No protection against
physical attacks
  Low CPU utilization   Low CPU utilization   CPU Intensive
Overview
 

The Benefits of GIGABYTE Ultra TPM

1. Security, manageability and flexibility that surpasses software-based
encryption.
2. No password required. Users don't have to remember and keep entering
their password. This also means there is no password for someone to crack.
• Quick and effortless protection of data; plug in USB key to access data,
  or remove to safeguard.
• Keeps data secure even when users are away from computer.
3. Optional backup of key stored in BIOS in case of misplaced key.
4. Very low CPU utilization. As all the encryption and decryption is done by
the TPM, users are able to do other tasks simultaneously.

While no security system is 100% secure, GIGABYTE Ultra TPM provides the industry's highest level of military grade security, and at the same time, makes it easy enough for anyone to use. Whether protecting important data at the office or ensuring your kids don't accidentally delete things off the home computer, GIGABYTE Ultra TPM has you covered. Think of it as your own personal 24/7 security force.

 
  GIGABYTE Ultra TPM Motherboards  
 
Intel X58
GA-EX58-UD4P      
 
 
Intel P45
GA-EP45-DQ6 GA-EP45-DS5 GA-EP45-DS4P GA-EP45-UD3P
GA-EP45-DS3R GA-EP45C-DS3R GA-EP45T-DS3R GA-EP45T-UD3P
 
Intel G45
GA-EG45M-DS2H      
 
         
Intel P43
GA-EP43-DS3R      
 
         
 
 
Downloads
Flash demo       Wallpaper      
      1280 x 1024
1024 x 768
800 x 600
 
 
All intellectual property rights, including without limitation to copyright and trademark of this work and its derivative works are the property of, or are licensed to,
GIGABYTE TECHNOLOGY CO., LTD. Any unauthorized use is strictly prohibited.