Companies using the specification will adopt a combination hardware-software security approach, involving a security chip that encrypts data. The security chip, an integral component of the specification, resides on a computer's motherboard. "This offers even more robust security . . .
Companies using the specification will adopt a combination hardware-software security approach, involving a security chip that encrypts data. The security chip, an integral component of the specification, resides on a computer's motherboard. "This offers even more robust security than software alone," said Technology Business Research's Bob Sutherland. "IBM's chip is unparalleled by any other chip out there. It's not surprising these organisations are establishing standards IBM has been involved in."

Hackers using Trojan horses and other tools could pilfer passwords used even as part of the encryption process, Sutherland said. "Software has been a concern because it's easier for hackers to work on these things."

The link for this article located at ZDNet UK is no longer available.