A piece of hardware called […] provides cryptographic functions to a singular computer
Trusted Platform Module (TPM)
A […] is used in large environments to provide cryptographic functions to hundreds / thousands of computers
Hardware Secure Module (HSM)
A […] stores all of your organizations keys and allows management of them from a single console
Key Management System
A […] is a secondary processor (CPU) in your system that provides privacy for your data and has extensive security features
- Own boot ROM
- Real time encryption
- Monitors system boot process
Secure Enclave