|
Data Security Has Never
Been This Easy |
GIGABYTE X58 / P45 / G45 / P43 Ultra TPM Motherboards |
|
|
|
|
|
Plug & Play 2048 bit USB Key with
Hardware based TPM security |
|
|
|
|
Setting a New Standard for Motherboard Security
In today's computing environment, security threats such as viruses, worms, trojan attacks, malicious hacking and data/identity theft, etc. are not only happening more frequently, but the cost to victims of such attacks are also on the rise. While software solutions are able to protect data to a certain degree, a higher level of security measures is needed to ensure you do not become the next victim.
|
|
|
That is where a hardware based solution such as TPM (Trusted Platform Module) technology can help. Trusted Platform Modules are hardware based security microcontrollers that store keys, passwords and digital certificates and protects this data from external software attacks and physical theft. |
|
|
Recognizing the need to protect users against today's computing security threats, GIGABYTE is the first motherboard manufacturer to equip their motherboards with an onboard TPM Module from Infineon with 2048 bit encryption key. But, they didn't stop there. GIGABYTE has paired their TPM module with a security software interface called GIGABYTE Ultra TPM, providing the Industry's highest level of data security through a hardware + software design.
In order to better understand GIGABYTE Ultra TPM and how it works, let's first get a crash course in how data security works. |
|
|
|
|
Easy to Secure Your Data
With Infineon's TPM chip built-in, GIGABYTE provides TPM hardware-based encryption and decryption with digital signature keys to ensure a maximum level of data protection with 2048 bit encryption. GIGABTE Ultra TPM provides an added layer of security by allowing users to store their digital signature key on a USB thumb drive, so when they step away from their system, they can take the key with them, locking up their data and preventing unauthorized access while they are away. When making the portable user key, GIGABYTE Ultra TPM auto deletes the user key in the hard drive, ensuring the maximum level of data protection.
Nearly Impossible to Crack
Most data security solutions, whether they are software or hardware based, rely on a process of encryption and decryption to secure digital data. Encryption takes your data and transforms it, making it unreadable to anyone that doesn't have a "key" to read it. The key basically tells how that information was transformed, and acts as a password for the data. Once you have the key, you are able to undo the encryption, a process called decryption, making the data readable again. |
|
|
|
Key size basically determines the level of security; 1 bit keys being the least secure, all
the way up to the 2048 bit key found in GIGABYTE's Ultra TPM. How secure is 2048 bit
security? The number of possible combinations from a 2048 bit number is 22048, which
is 3.23 x 10616. That is 3 followed by 616 zeros or
30000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000
0000000000000000000000000000000000000000000000000
That is how many possible different number combinations a 2048 bit key has. A computer capable of one million instructions per second would have to work for 1014 years to crack the key. Is it any wonder why this is considered military |
|
|
|
Hardware + Software vs Software Based Security |
|
|
GIGABYTE Ulltra TPM
Hardware + Software
based Encryption |
|
|
TPM Hardware based
Security |
|
|
Software based
Encryption |
|
|
• |
Platform authentication with
integrated security solution
|
|
• |
Platform authentication with
integrated security solution |
|
• |
Low Level of security |
• |
Keys and secrets protected by
dedicated hardware |
• |
Keys and secrets protected
by dedicated hardware |
• |
Key can be deleted completely
from system offering the highest
level of security possible |
|
|
|
• |
High protection against logical
attacks |
|
• |
High protection against
logical attacks |
|
• |
Low protection against
logical attacks |
|
• |
Highest level of protection
against physical attacks |
|
• |
High protection against
physical attacks |
|
• |
No protection against
physical attacks |
|
• |
Low CPU utilization |
|
• |
Low CPU utilization |
|
• |
CPU Intensive |
|
|
|
|
The Benefits of GIGABYTE Ultra TPM
1. |
Security, manageability and flexibility that surpasses software-based
encryption. |
2. |
No password required. Users don't have to remember and keep entering
their password. This also means there is no password for someone to crack.
• Quick and effortless protection of data; plug in USB key to access data,
or remove to safeguard.
• Keeps data secure even when users are away from computer. |
3. |
Optional backup of key stored in BIOS in case of misplaced key. |
4. |
Very low CPU utilization. As all the encryption and decryption is done by
the TPM, users are able to do other tasks simultaneously. |
While no security system is 100% secure, GIGABYTE Ultra TPM provides the industry's highest level of military grade security, and at the same time, makes it easy enough for anyone to use. Whether protecting important data at the office or ensuring your kids don't accidentally delete things off the home computer, GIGABYTE Ultra TPM has you covered. Think of it as your own personal 24/7 security force. |
|
|
|
GIGABYTE Ultra TPM Motherboards |
|
|
|
|
|
|
|
|
Downloads |
|
|
|
|
|
|
|
|
|
|
|